devops
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs users to download the Google Cloud SDK using a direct shell-piped command (
curl https://sdk.cloud.google.com | bash). This is a recognized pattern for installing official developer tools from Google, which is a trusted organization. - [REMOTE_CODE_EXECUTION]: Automated scans detected the execution of a remote script from
google.com. This facilitates the installation of thegcloudCLI tool. As the source is an official vendor domain, this is documented as standard setup procedure for the platform. - [COMMAND_EXECUTION]: The skill provides scripts (
cloudflare_deploy.py) that use thesubprocessmodule to executewranglerCLI commands. This is expected functionality for a deployment automation tool. - [DATA_EXFILTRATION]: The
.env.examplefile contains placeholders for sensitive credentials (API tokens, account IDs). No hardcoded secrets were found; the file follows best practices by providing a template for users to populate locally. - [PROMPT_INJECTION]: The
docker_optimize.pyscript ingests content from local Dockerfiles to provide optimization suggestions. This creates a surface for indirect prompt injection where a maliciously crafted Dockerfile could attempt to influence agent responses. However, the script only performs static analysis and does not execute the Dockerfile content, posing no direct execution risk.
Audit Metadata