ce-session-inventory

Pass

Audited by Gen Agent Trust Hub on Apr 27, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses a bash script (scripts/discover-sessions.sh) and a Python script (scripts/extract-metadata.py) to search through local directories (~/.claude, ~/.codex, ~/.cursor) and read session logs. These operations are restricted to the local file system and are used solely for their stated purpose of inventorying session history.
  • [EXTERNAL_DOWNLOADS]: No external downloads or remote dependencies are initiated. The skill relies on standard tools (bash, python3, find, xargs) available in the local environment.
  • [DATA_EXFILTRATION]: There are no network operations detected in the scripts. The data extracted is emitted to stdout for the agent's consumption within the platform and is not sent to external servers.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 27, 2026, 04:01 AM