implementing-query-caching

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [DATA_EXPOSURE] (SAFE): The skill identifies sensitive data caching as a pitfall and explicitly instructs users never to cache authentication tokens, passwords, or PII.
  • [CREDENTIALS_UNSAFE] (SAFE): All code examples for Redis and Upstash connections utilize environment variable placeholders (e.g., process.env.REDIS_HOST, process.env.UPSTASH_REDIS_REST_TOKEN), preventing credential leakage.
  • [EXTERNAL_DOWNLOADS] (SAFE): The skill references established and trusted Node.js packages including ioredis and @prisma/client.
  • [PROMPT_INJECTION] (SAFE): No instructions attempting to bypass safety filters or override system prompts were detected in the markdown or code comments.
  • [COMMAND_EXECUTION] (SAFE): The skill does not contain any logic for executing shell commands or arbitrary system code.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:41 PM