esp32-serial-commands
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The skill includes bash snippets for identifying serial ports and sending text commands to them (e.g.,
echo "PRESS" > "$PORT"). These commands are standard for hardware interaction and are restricted to common serial device paths (/dev/ttyUSB*, /dev/ttyACM*, etc.). - [DATA_EXFILTRATION] (SAFE): No sensitive file paths are accessed, and no network operations to external domains were identified. The only file interaction is with local serial device nodes and a temporary log file (
/tmp/device.log). - [EXTERNAL_DOWNLOADS] (SAFE): The skill does not attempt to download or install external packages or scripts.
- [PROMPT_INJECTION] (SAFE): No prompt injection or instructions to bypass safety guidelines were found in the markdown or metadata.
Audit Metadata