skills/jeremylongshore/claude-code-plugins-plus-skills/implementing-backup-strategies/Gen Agent Trust Hub
implementing-backup-strategies
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONNO_CODE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses tools such as
tar,rsync, and theawsCLI for its operations. These tools are restricted by prefix in theallowed-toolsconfiguration to their specific backup-related subcommands.\n- [DATA_EXFILTRATION]: The skill is designed to transfer data to external destinations (e.g., AWS S3, remote NAS). While this is the intended function, it involves moving potentially sensitive information like database dumps and configuration files off-site.\n- [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection.\n - Ingestion points: Data from file systems (via
rsync/tar) and database contents (viapg_dump/mysqldump) read during backup tasks inSKILL.md.\n - Boundary markers: Absent. The instructions do not specify how to handle or ignore instructions embedded in the data being backed up.\n
- Capability inventory: Subprocess execution via
Bash(includingtar,rsync, andaws), and file system modification viaWriteandEdittools.\n - Sanitization: Absent. There are no steps to validate or sanitize data content before processing.\n- [NO_CODE]: Several scripts listed in the
scripts/README.mdfile, includingbackup_database.sh,restore_database.sh,validate_backup.py, andconfigure_backup_agent.py, are referenced but their source code is not included in the skill package.
Audit Metadata