hydra-head
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (LOW): The script
scripts/hydra-node.shusesexec "$@"to pass all command-line arguments directly to thehydra-nodebinary or a Docker container. While this is a standard wrapper pattern, it facilitates the execution of arbitrary flags or subcommands provided by the agent or user. Additionally, theSKILL.mduses a context command!hydra-node --versionto probe the local environment.- [EXTERNAL_DOWNLOADS] (LOW): The skill's metadata and fallback script reference external software installations (viabrew) and a Docker image fromghcr.io/cardano-scaling/hydra-node. These sources are not on the pre-defined trusted list, although they are the official distributions for the Hydra project. Per the [TRUST-SCOPE-RULE], the severity is maintained at LOW as these are essential to the primary skill purpose.- [CREDENTIALS_UNSAFE] (SAFE): The skill handles sensitive Cardano and Hydra signing keys (.skfiles) and Blockfrost API keys. It correctly provides security guidance, such as usingchmod 600to restrict file access and warning the user to treat them as secrets. No hardcoded credentials or exfiltration patterns were detected.
Audit Metadata