session-reader
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses local shell commands such as
lsto find session files anduv runto execute its included Python script for log parsing. These operations are limited to the user's local session directory. - [DATA_EXFILTRATION]: No network activity, credential harvesting, or external data transmission mechanisms were found. The skill only processes and displays data to the user locally.
- [PROMPT_INJECTION]: The instructions do not contain any patterns attempting to override system behavior, bypass safety filters, or extract system prompts.
- [REMOTE_CODE_EXECUTION]: The skill relies on a local Python script with no external dependencies. It does not download or execute scripts from remote servers.
- [INDIRECT_PROMPT_INJECTION]: While the skill ingests untrusted data in the form of conversation logs, it does so for the purpose of historical analysis. The parsing script only formats and prints content without passing it to dangerous sinks like
eval()orexec().
Audit Metadata