esp32-serial-commands

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION] (SAFE): The skill includes bash snippets for identifying serial ports and sending text commands to them (e.g., echo "PRESS" > "$PORT"). These commands are standard for hardware interaction and are restricted to common serial device paths (/dev/ttyUSB*, /dev/ttyACM*, etc.).
  • [DATA_EXFILTRATION] (SAFE): No sensitive file paths are accessed, and no network operations to external domains were identified. The only file interaction is with local serial device nodes and a temporary log file (/tmp/device.log).
  • [EXTERNAL_DOWNLOADS] (SAFE): The skill does not attempt to download or install external packages or scripts.
  • [PROMPT_INJECTION] (SAFE): No prompt injection or instructions to bypass safety guidelines were found in the markdown or metadata.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 05:46 PM