granola-upgrade-migration

Pass

Audited by Gen Agent Trust Hub on Mar 24, 2026

Risk Level: SAFE
Full Analysis
  • [PROMPT_INJECTION]: No prompt injection or override patterns detected. The instructions follow standard agent behavior guidelines.
  • [DATA_EXFILTRATION]: No unauthorized data access or exfiltration patterns found. File access is limited to standard application versioning and cache locations (~/Library/Caches/Granola).
  • [REMOTE_CODE_EXECUTION]: Uses legitimate tools for software management. Software updates are performed via Homebrew (brew upgrade) or the official product website (granola.ai), which are safe sources for the intended application.
  • [COMMAND_EXECUTION]: Shell commands are restricted to checking application metadata (Info.plist) and using well-known system tools for updates.
  • [OBFUSCATION]: No obfuscated code, hidden characters, or encoded strings detected.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 24, 2026, 05:47 PM