payment-integration

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: LOW
Full Analysis
  • [COMMAND_EXECUTION] (SAFE): Uses standard Linux utilities (find, grep, xargs) to scan local source files for security patterns. All commands are executed locally on the provided project path and are used for read-only auditing purposes.
  • [CREDENTIALS_UNSAFE] (SAFE): The script contains regex patterns to detect hardcoded credentials (e.g., 'sk_live_', 'pk_test_') for the purpose of flagging them as security violations to the user. It does not store or exfiltrate any credentials it identifies.
  • [DATA_EXFILTRATION] (SAFE): No network operations (curl, wget, or socket calls) are present in the script. All analysis results are printed to stdout.
  • [REMOTE_CODE_EXECUTION] (SAFE): No external dependencies are downloaded or executed. The script relies entirely on built-in shell commands and the user-provided local directory.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 17, 2026, 06:51 AM