implementing-query-caching
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [DATA_EXPOSURE] (SAFE): The skill identifies sensitive data caching as a pitfall and explicitly instructs users never to cache authentication tokens, passwords, or PII.
- [CREDENTIALS_UNSAFE] (SAFE): All code examples for Redis and Upstash connections utilize environment variable placeholders (e.g.,
process.env.REDIS_HOST,process.env.UPSTASH_REDIS_REST_TOKEN), preventing credential leakage. - [EXTERNAL_DOWNLOADS] (SAFE): The skill references established and trusted Node.js packages including
ioredisand@prisma/client. - [PROMPT_INJECTION] (SAFE): No instructions attempting to bypass safety filters or override system prompts were detected in the markdown or code comments.
- [COMMAND_EXECUTION] (SAFE): The skill does not contain any logic for executing shell commands or arbitrary system code.
Audit Metadata