atmos-terraform

Pass

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes atmos and terraform binary commands to perform infrastructure operations like planning, applying, and destroying resources. These are standard subprocess executions for the intended functionality of the skill.\n- [UNVERIFIABLE_DEPENDENCIES_AND_REMOTE_CODE_EXECUTION]: The source pull command is used to download component source code from remote Git repositories. This is a core feature for modular Terraform management and targets vendor-controlled or user-configured locations.\n- [DYNAMIC_EXECUTION]: The skill uses Go templates and YAML functions within stack configuration manifests to dynamically resolve values at runtime. This behavior is documented and intrinsic to the Atmos orchestration logic.\n- [DATA_EXPOSURE_AND_EXFILTRATION]: The skill generates terraform.tfvars.json and backend.tf.json files which may contain sensitive configuration data. The documentation follows security best practices by recommending that these generated files be added to .gitignore to prevent accidental exposure in version control.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 4, 2026, 06:40 PM