synology-file-station
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill uses environment variables (
SYNOLOGY_USERNAME,SYNOLOGY_PASSWORD) for authentication, avoiding hardcoded secrets. It follows best practices by providing an example configuration file (assets/config.example.env) with placeholders. - [SAFE]: Network operations are directed to the user-configured
SYNOLOGY_BASE_URL. The script provides an option to verify SSL certificates and uses standard Python libraries (urllib,ssl) for communication. - [SAFE]: The skill includes built-in safety mechanisms, such as
SYNOLOGY_READONLYto block write operations andSYNOLOGY_MUTATION_ALLOW_PATHSto restrict modifications to specific directory trees on the NAS. - [SAFE]: File operations (upload/download) are performed using explicit paths provided by the user via CLI arguments. Local file access is limited to the files specified for upload or the destination directory for downloads.
Audit Metadata