nixpkgs-register

Pass

Audited by Gen Agent Trust Hub on Mar 17, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: Employs standard system tools including nix-build, nix search, git, and the gh CLI to facilitate the research, development, and submission of Nix packages.
  • [COMMAND_EXECUTION]: Instructs the agent to execute compiled binaries (e.g., ./result/bin/<exec>) to verify the success of the build process and package functionality.
  • [EXTERNAL_DOWNLOADS]: Fetches source code and the official nixpkgs repository from GitHub. These operations utilize well-known services and trusted Nix functions (fetchFromGitHub).
  • [PROMPT_INJECTION]: The workflow involves ingesting external data from GitHub searches and source code, creating a surface for indirect prompt injection. However, this risk is inherent to the packaging task and is addressed within a controlled sequence of development steps.
  • Ingestion points: External package metadata and research results from GitHub API/search calls (SKILL.md).
  • Boundary markers: None present.
  • Capability inventory: Subprocess execution via nix, git, and gh across all workflow phases.
  • Sanitization: None observed; the workflow relies on standard agent processing of research results.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 17, 2026, 02:42 PM