configure-memory-profiling
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses dynamic context injection placeholders (!
command) to perform project discovery during the loading phase. It executes benign commands such aspwd,find, andgrepto identify existing configuration files and memory testing infrastructure. - [COMMAND_EXECUTION]: The skill utilizes the 'uv' package manager to install development dependencies and 'pytest' to run memory-integrated tests and leak detection.
- [EXTERNAL_DOWNLOADS]: The skill performs lookups on the official Python Package Index (PyPI) to verify current tool versions and downloads packages from standard, well-known registries.
- [SAFE]: The skill generates project-specific files, including test templates and GitHub Actions workflows. This behavior is consistent with the stated objective of configuring memory profiling for CI/CD and does not demonstrate unauthorized persistence or privilege escalation.
- [SAFE]: The skill ingests data from local project manifests (e.g., pyproject.toml, requirements.txt) to verify installation status. Ingestion points: pyproject.toml, requirements.txt; Boundary markers: Absent; Capability inventory: Bash, Write, WebFetch; Sanitization: Absent. This surface is standard for configuration management skills and does not exhibit malicious patterns.
Audit Metadata