terraform
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references and links to guidance and supplementary materials from HashiCorp's official repositories on GitHub. These are well-known and trusted sources for infrastructure-as-code configuration.
- [COMMAND_EXECUTION]: The instructions involve the use of standard Terraform CLI tools such as
terraform fmt,terraform validate, andterraform testfor their intended purposes. These commands are necessary for the development workflows described in the skill. - [DATA_EXFILTRATION]: The skill promotes secure configuration practices, such as using the
sensitive = trueattribute for variables and outputs and explicitly warning against hardcoding credentials in HCL files. - [PROMPT_INJECTION]: The skill identifies a surface for indirect prompt injection through the analysis of external Terraform configuration files. Ingestion points: The agent reads and analyzes HCL files within a user-defined
source_directoryduring the module refactoring process. Boundary markers: No specific delimiters are mentioned to isolate untrusted configuration data from the agent's internal instructions. Capability inventory: The skill performs local file system reads and uses the Terraform CLI for validation. Sanitization: The skill relies on Terraform's native parsing and validation logic for processing input configuration.
Audit Metadata