loom-prometheus
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill provides comprehensive documentation, configuration examples, and PromQL patterns for Prometheus monitoring. No malicious behavior or vulnerabilities were detected.
- [CREDENTIALS_UNSAFE]: All configuration examples for Alertmanager, PagerDuty, and EC2 service discovery use descriptive placeholders (e.g., 'YOUR_ACCESS_KEY', 'YOUR_SECRET_KEY') instead of hardcoded credentials.
- [COMMAND_EXECUTION]: The troubleshooting section contains standard commands like 'promtool' and 'curl'. These commands target the local Prometheus server ('localhost:9090') for diagnostic purposes and do not pose a security risk.
- [EXTERNAL_DOWNLOADS]: Application instrumentation examples reference official, well-known client libraries for Go and Python ('prometheus_client'). These are standard industry dependencies for metrics collection.
Audit Metadata