spark-python-data-source
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: The skill instructions do not contain any patterns attempting to override agent behavior or bypass safety guidelines. Instructions are focused on technical implementation and architectural principles.
- [DATA_EXFILTRATION]: No evidence of unauthorized data transmission or hardcoded sensitive file paths. The skill provides explicit guidance on using secure authentication methods and redacting sensitive keys (e.g., API keys, passwords) from logs and object representations.
- [CREDENTIALS_UNSAFE]: No hardcoded credentials were found. All authentication examples use placeholders or secure retrieval methods like 'pyspark.dbutils.secrets' or 'azure.identity.DefaultAzureCredential'.
- [REMOTE_CODE_EXECUTION]: The skill does not include any patterns for downloading and executing untrusted remote code. It recommends standard dependency management using Poetry and well-known libraries like 'requests' and 'azure-identity'.
- [COMMAND_EXECUTION]: There are no arbitrary shell command executions. The command examples provided are standard development tools such as 'poetry', 'ruff', and 'pytest'.
- [EXTERNAL_DOWNLOADS]: All external references and repositories mentioned are from well-known sources (Databricks, Apache Spark official docs, and established community experts) and are documented neutrally as implementation references.
Audit Metadata