cloud-dev-environment
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill includes instructions to execute commands with elevated privileges, such as
sudo dockerdandsudo chmod 666 /var/run/docker.sock. Within the context of a dedicated Cloud Development VM, these are standard operations required to initialize and grant access to the Docker daemon. - [CREDENTIALS_UNSAFE]: The documentation mentions various environment variables (e.g.,
UPSTASH_REDIS_TOKEN,MICROSOFT_CLIENT_ID) and directs the user to store them in a.env.localfile. This is a standard and recommended practice for managing local development secrets and does not involve hardcoding credentials or exfiltrating data.
Audit Metadata