pydantic-models-py
Pass
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists of a markdown file (SKILL.md) describing how to use a Pydantic model template, a Python template file (assets/template.py), and a markdown file (references/acceptance-criteria.md) providing documentation and examples.
- Prompt Injection: No patterns indicative of prompt injection were found in any of the files. The content is purely instructional and descriptive.
- Data Exfiltration: No commands or code snippets that attempt to read sensitive files or exfiltrate data over the network were found. The Python files are templates and examples, not executable scripts that perform I/O or network operations.
- Obfuscation: No malicious obfuscation techniques (e.g., Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected. The
{{ResourceName}}and{{resource_name}}are clearly marked placeholders for templating, not obfuscation. - Unverifiable Dependencies: The skill itself does not install or download any external dependencies. It provides a template for using the Pydantic library, which is an external dependency for the user's project, but the skill itself does not manage this. References to Pydantic documentation are benign.
- Privilege Escalation: No commands or code attempting to escalate privileges (e.g.,
sudo,chmod) were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc, creating cron jobs) were found. - Metadata Poisoning: The metadata in
SKILL.mdis benign and accurately describes the skill's purpose. - Indirect Prompt Injection: The skill does not process external, untrusted user input in a way that would make it susceptible to indirect prompt injection.
- Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were found.
Overall, the skill is a static collection of templates and documentation, posing no security risk.
Audit Metadata