algolia-common-errors

Pass

Audited by Gen Agent Trust Hub on Apr 13, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE]: The skill provides diagnostic bash scripts and code snippets for troubleshooting Algolia-specific errors (403, 404, 429, etc.).
  • [COMMAND_EXECUTION]: Uses curl to interact with official Algolia API endpoints (*.algolia.net) and the Algolia status page (status.algolia.com). These are well-known services and consistent with the skill's purpose.
  • [CREDENTIALS_UNSAFE]: Appropriately handles sensitive credentials by referencing environment variables ($ALGOLIA_ADMIN_KEY) and using safe shell expansion patterns to verify their presence or length without revealing the actual values.
  • [EXTERNAL_DOWNLOADS]: Mentions the algoliasearch package via npm list, which is a well-known library for the service being diagnosed. No unexpected or remote code execution patterns were found.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 13, 2026, 09:29 PM