erpnext-syntax-clientscripts

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): The content consists entirely of technical documentation and syntax guidance. No instructions were found that attempt to override system prompts or bypass safety filters.\n- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, API keys, or access to sensitive local file paths were detected. The mentioned frappe.call methods are standard framework functions for server communication.\n- [Obfuscation] (SAFE): All files are written in clear, human-readable markdown and JavaScript. No Base64, zero-width characters, or other encoding techniques were found.\n- [Unverifiable Dependencies & Remote Code Execution] (SAFE): No external package managers (npm/pip) or remote script execution patterns (curl | bash) are used or recommended.\n- [Dynamic Execution] (SAFE): The skill does not use or suggest the use of unsafe dynamic execution methods like eval() or exec().
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:07 PM