container-registry-setup
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOW
Full Analysis
- Category 2: Data Exposure (SAFE): The skill mentions the sensitive file path ~/.docker/config.json in a troubleshooting context for manual credential clearing. No automated scripts or commands within the skill attempt to read or exfiltrate this or any other sensitive file.
- Category 3: Obfuscation (SAFE): The Kubernetes Secret example includes a Base64-encoded string. Decoding reveals it contains only benign placeholder credentials (user:pass), which is standard for documentation and not a malicious attempt to hide instructions.
- Category 4: External Downloads (SAFE): The skill references several GitHub Actions (e.g., actions/checkout, docker/login-action). These are industry-standard components for CI/CD workflows and are provided as templates for user implementation rather than automated execution by the agent.
- Category 8: Indirect Prompt Injection (SAFE): This skill provides static setup templates and lacks the capability to ingest or process untrusted external data during its operation, thereby presenting no attack surface for indirect injection.
Audit Metadata