code-necromancer
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE] (LOW): The skill's primary 'Archaeology' phase involves searching for and cataloging hardcoded credentials, API keys, and environment variables (e.g., in
secrets-needed.mdandreferences/archaeology-guide.md). While this is a documented part of the modernization process, it explicitly pulls sensitive data into the agent's context. - [COMMAND_EXECUTION] (LOW): The skill uses the
Bashtool to run repository scanners (scripts/scan-repos.sh) and searches codebases usinggrepandfind. It also leverages the GitHub CLI (gh) to extract organization data. Executing these tools on potentially untrusted file structures carries operational risk. - [REMOTE_CODE_EXECUTION] (LOW): During the 'Resurrection' phase, the agent is instructed to install dependencies (
npm install,pip install) and run integration tests on the legacy codebase. This results in the execution of code from the target repository, which may contain malicious logic if the codebase was compromised prior to analysis. - [DATA_EXFILTRATION] (SAFE): While the skill gathers sensitive information, there are no patterns detected that attempt to send this data to unauthorized external endpoints. The use of
WebFetchis documented for legitimate dependency auditing.
Audit Metadata