security-testing
Pass
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: Several Python scripts in the
scripts/directory usesubprocess.call()to orchestrate internal tasks. For example,batch_convert_templates.pyand various wrapper scripts likeconvert_to_csv.pyinvokeconvert_formats.pyusing the current Python interpreter (sys.executable). This is a legitimate and safe use of subprocess for internal tool coordination, and it does not utilizeshell=Trueor incorporate untrusted external input. - [DATA_EXFILTRATION]: The skill does not contain any network-related operations, such as
curl,wget, or HTTP requests. It operates entirely on local file inputs provided by the user for the purpose of generating reports and testing plans. No hardcoded credentials or access to sensitive system paths (like.sshor.aws) were found. - [PROMPT_INJECTION]: The
prompts/security-testing.mdfile provides clear, defensive instructions for the agent to act as a senior QA expert. It focuses on risk reduction and safe validation without any attempts to bypass safety filters or provide offensive exploitation guidance. - [REMOTE_CODE_EXECUTION]: There are no patterns suggesting the download or execution of remote scripts. The installation scripts mentioned in the README are local to the repository, and the functional scripts do not ingest data from remote sources.
Audit Metadata