cloud-dev-environment

Pass

Audited by Gen Agent Trust Hub on May 9, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill includes instructions to execute commands with elevated privileges, such as sudo dockerd and sudo chmod 666 /var/run/docker.sock. Within the context of a dedicated Cloud Development VM, these are standard operations required to initialize and grant access to the Docker daemon.
  • [CREDENTIALS_UNSAFE]: The documentation mentions various environment variables (e.g., UPSTASH_REDIS_TOKEN, MICROSOFT_CLIENT_ID) and directs the user to store them in a .env.local file. This is a standard and recommended practice for managing local development secrets and does not involve hardcoding credentials or exfiltrating data.
Audit Metadata
Risk Level
SAFE
Analyzed
May 9, 2026, 02:18 AM