openocd-jtag
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Provides standard shell commands for hardware debugging, including running the OpenOCD daemon (
openocd -f openocd.cfg), starting the GDB debugger (arm-none-eabi-gdb firmware.elf), and interacting with local services via telnet (telnet localhost 4444). These operations are consistent with the skill's stated purpose. - [COMMAND_EXECUTION]: Uses command substitution in
ls $(openocd --help 2>&1 | grep "scripts" | head -1)/interface/to help the user locate OpenOCD configuration files on their local filesystem. This is a common and safe pattern for exploring local tool installations. - [SAFE]: No remote downloads, sensitive data access, or obfuscation techniques were identified. Network operations are limited to the local loopback interface (
localhost) for inter-process communication between debugging tools (GDB to OpenOCD).
Audit Metadata