redis
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The skill provides standard redis-cli examples. While it requests the Bash tool, it is for legitimate database interaction and lacks any patterns of command injection or unauthorized system access.
- [CREDENTIALS_UNSAFE] (SAFE): The redis-cli examples use common placeholders or local defaults ('password', 'localhost'). No hardcoded sensitive secrets or API keys are present.
- [DATA_EXFILTRATION] (SAFE): Network operations are restricted to standard Redis communication (port 6379 on localhost). No evidence of sending sensitive data to external, non-whitelisted domains was found.
- [REMOTE_CODE_EXECUTION] (SAFE): The use of redis.eval() for Lua scripts is a standard Redis feature for atomic operations (e.g., distributed locks) and is implemented here using safe, parameterized patterns rather than untrusted input concatenation.
Audit Metadata