skills/hazat/pi-config/session-reader/Gen Agent Trust Hub

session-reader

Pass

Audited by Gen Agent Trust Hub on May 9, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses local shell commands such as ls to find session files and uv run to execute its included Python script for log parsing. These operations are limited to the user's local session directory.
  • [DATA_EXFILTRATION]: No network activity, credential harvesting, or external data transmission mechanisms were found. The skill only processes and displays data to the user locally.
  • [PROMPT_INJECTION]: The instructions do not contain any patterns attempting to override system behavior, bypass safety filters, or extract system prompts.
  • [REMOTE_CODE_EXECUTION]: The skill relies on a local Python script with no external dependencies. It does not download or execute scripts from remote servers.
  • [INDIRECT_PROMPT_INJECTION]: While the skill ingests untrusted data in the form of conversation logs, it does so for the purpose of historical analysis. The parsing script only formats and prints content without passing it to dangerous sinks like eval() or exec().
Audit Metadata
Risk Level
SAFE
Analyzed
May 9, 2026, 07:10 PM