synology-file-station

Pass

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE]: The skill uses environment variables (SYNOLOGY_USERNAME, SYNOLOGY_PASSWORD) for authentication, avoiding hardcoded secrets. It follows best practices by providing an example configuration file (assets/config.example.env) with placeholders.
  • [SAFE]: Network operations are directed to the user-configured SYNOLOGY_BASE_URL. The script provides an option to verify SSL certificates and uses standard Python libraries (urllib, ssl) for communication.
  • [SAFE]: The skill includes built-in safety mechanisms, such as SYNOLOGY_READONLY to block write operations and SYNOLOGY_MUTATION_ALLOW_PATHS to restrict modifications to specific directory trees on the NAS.
  • [SAFE]: File operations (upload/download) are performed using explicit paths provided by the user via CLI arguments. Local file access is limited to the files specified for upload or the destination directory for downloads.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 10, 2026, 03:55 AM