posthog-multi-env-setup
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: No malicious patterns or security vulnerabilities were detected. The skill promotes secure practices like using secret management services (AWS Secrets Manager, GCP Secret Manager, Vault) instead of hardcoding credentials.
- [COMMAND_EXECUTION]: The skill requests access to cloud provider and vault CLI tools (
aws:*,gcloud:*,vault:*). This access is used legitimately to fetch environment-specific secrets as described in the configuration strategy. - [SAFE]: Dynamic file loading in the provided TypeScript code (using
require) is protected by a strict whitelist check against allowed environment names, preventing path traversal attacks. - [SAFE]: All external links point to official documentation for PostHog and industry-standard configuration guidelines (12-Factor App).
Audit Metadata