nixpkgs-register
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: Employs standard system tools including
nix-build,nix search,git, and theghCLI to facilitate the research, development, and submission of Nix packages. - [COMMAND_EXECUTION]: Instructs the agent to execute compiled binaries (e.g.,
./result/bin/<exec>) to verify the success of the build process and package functionality. - [EXTERNAL_DOWNLOADS]: Fetches source code and the official
nixpkgsrepository from GitHub. These operations utilize well-known services and trusted Nix functions (fetchFromGitHub). - [PROMPT_INJECTION]: The workflow involves ingesting external data from GitHub searches and source code, creating a surface for indirect prompt injection. However, this risk is inherent to the packaging task and is addressed within a controlled sequence of development steps.
- Ingestion points: External package metadata and research results from GitHub API/search calls (SKILL.md).
- Boundary markers: None present.
- Capability inventory: Subprocess execution via
nix,git, andghacross all workflow phases. - Sanitization: None observed; the workflow relies on standard agent processing of research results.
Audit Metadata