python-database-patterns

Pass

Audited by Gen Agent Trust Hub on Feb 20, 2026

Risk Level: SAFE
Full Analysis
  • [CREDENTIALS_UNSAFE] (SAFE): The code snippets contain placeholder connection strings such as 'postgresql://user:pass@localhost/db'. These are standard documentation placeholders and do not represent actual leaked credentials.- [COMMAND_EXECUTION] (SAFE): Although the skill requests 'Read Write Bash' tool permissions in its metadata, the provided files contain no shell scripts or command execution logic. The permissions are likely intended for running database migrations via Alembic as mentioned in the documentation.- [DATA_EXFILTRATION] (SAFE): No patterns for network exfiltration or unauthorized file system access were detected. The network-related code (SQLAlchemy engines) is standard for database connectivity and uses local/placeholder targets.- [PROMPT_INJECTION] (SAFE): The content consists of technical documentation and code examples. There are no attempts to override agent instructions or bypass safety filters.- [REMOTE_CODE_EXECUTION] (SAFE): No remote scripts or external binaries are downloaded or executed. The dependencies listed are internal skill references.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 20, 2026, 10:59 AM