skills/cloudposse/atmos/atmos-auth/Gen Agent Trust Hub

atmos-auth

Pass

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides the atmos auth exec and atmos auth shell commands, which allow for the execution of arbitrary shell commands and interactive sessions within an environment pre-loaded with cloud credentials. These features are documented as core functionalities for infrastructure automation and development.
  • [EXTERNAL_DOWNLOADS]: The skill interacts with well-known and trusted authentication providers including AWS IAM Identity Center, Okta (SAML), GitHub Actions (OIDC), and Google Cloud Platform to retrieve security tokens. All identified network operations target official cloud service endpoints for credential exchange.
  • [CREDENTIALS_UNSAFE]: The skill manages highly sensitive identity information, including the ability to perform aws/assume-root operations and handle static IAM user credentials. It promotes security best practices by recommending the use of environment variable references and secure local keyrings rather than hardcoded secrets.
  • [SAFE]: The identified capabilities and configurations are consistent with the skill's stated purpose of identity management. The skill correctly leverages native OS security features like the macOS Keychain and GNOME Keyring to handle session data securely.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 4, 2026, 06:41 PM