performance-testing

Pass

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: SAFE
Full Analysis
  • [CREDENTIALS_UNSAFE]: Example K6 scripts such as load-test.js and the project README.md contain hardcoded credentials (username: 'test', password: 'test123'). These are specifically designed for the public sandbox at https://test.k6.io used for demonstration purposes and do not involve sensitive user information.
  • [COMMAND_EXECUTION]: Multiple helper scripts in the scripts/ directory, including batch_convert_templates.py and various convert_to_*.py wrappers, utilize the Python subprocess module to execute internal conversion logic. These executions are constrained to the skill's own scripts and use list-based argument passing, which is a secure method for invoking subcommands.
  • [EXTERNAL_DOWNLOADS]: The skill makes network requests to legitimate and well-known testing endpoints such as test.k6.io and jsonplaceholder.typicode.com as part of its core performance testing functionality. Additionally, the documentation provides instructions for installing the K6 CLI tool from official sources.
  • [PRIVILEGE_ESCALATION]: Documentation within examples/k6-load-testing/README.md suggests using sudo for the installation of the K6 binary on Linux systems. This is a standard system administration task for installing software via package managers and is not executed automatically by the skill's scripts.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 14, 2026, 07:16 AM