uv-project-migration

Pass

Audited by Gen Agent Trust Hub on Feb 24, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill instructs users to install the 'uv' tool using a shell script from 'astral.sh'. This is the official installation method for 'uv', which is a well-known development tool from a recognized software company.
  • [REMOTE_CODE_EXECUTION]: The skill contains a shell command curl -LsSf https://astral.sh/uv/install.sh | sh. While this pattern involves executing a remote script, it targets a well-known and trusted technology service (Astral), which is standard practice for installing this specific developer tool.
  • [COMMAND_EXECUTION]: The skill makes extensive use of local command execution via Bash to perform project migrations, including commands like uv init, uv sync, and git commit. These operations are consistent with the skill's primary purpose of managing local Python development workflows.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 24, 2026, 05:24 PM