deployment-config-create
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (SAFE): The skill executes a local Python script
scripts/create_config.pyto manage deployment configurations. This aligns with the primary stated purpose of the skill. - DATA_EXPOSURE & EXFILTRATION (SAFE): Although the script handles sensitive deployment variables like
$REMOTE_HOSTand$REMOTE_USER, these are used locally to populate configuration templates. No evidence of hardcoded credentials or unauthorized network exfiltration was found. - INDIRECT PROMPT INJECTION (LOW):
- Ingestion points: The script can ingest data from an external JSON file via the
--from-jsonflag. - Boundary markers: None identified in the provided markdown file.
- Capability inventory: The script has the capability to write and modify several key deployment files:
Makefile,Dockerfile,docker-compose.yaml, and.deploy.env.*files. - Sanitization: The markdown does not specify sanitization or validation routines for the JSON input or environment variables.
- DYNAMIC EXECUTION (LOW): The skill generates and modifies executable or configuration-heavy files (
Makefile,Dockerfile). While this involves creating executable content, it is the core functionality of a deployment configuration tool and is performed locally using template logic.
Audit Metadata