implementing-vulnerability-management-with-greenbone

Pass

Audited by Gen Agent Trust Hub on Apr 20, 2026

Risk Level: SAFE
Full Analysis
  • [CREDENTIALS_UNSAFE]: The script scripts/agent.py includes industry-standard default credentials (admin/"admin") in the connect_gvm function signature and the CLI argument parser. These are well-known defaults for Greenbone/OpenVAS services and do not represent a credential leak from a specific environment.
  • [EXTERNAL_DOWNLOADS]: The skill requires the installation of the python-gvm library via pip. This is the official and verified library from the Greenbone organization for GMP protocol interaction.
  • [COMMAND_EXECUTION]: The script provides functionality to interact with the Greenbone Vulnerability Manager daemon via network or Unix sockets to perform security audits, which is consistent with the skill's stated purpose.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 20, 2026, 07:15 PM