frappe-ops-performance

Pass

Audited by Gen Agent Trust Hub on Mar 31, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes standard administrative commands for managing the Frappe framework and associated infrastructure, including the bench CLI, mysql for database operations, and redis-cli for cache management. These tools are used for diagnostic and tuning purposes as intended.
  • [COMMAND_EXECUTION]: Instructions include service management operations using sudo systemctl and sudo supervisorctl to apply configuration changes to MariaDB and Gunicorn workers. These operations require elevated privileges but are standard practice for server performance tuning.
  • [EXTERNAL_DOWNLOADS]: Recommends the installation of rq-dashboard via pip to provide visual monitoring of background job queues. This is a well-known community tool compatible with the Redis Queue (RQ) implementation used by Frappe.
  • [DATA_EXFILTRATION]: Accesses system-level configuration files (e.g., /etc/mysql/mariadb.conf.d/) and database logs (e.g., /var/log/mysql/slow.log) for analysis. While these files are sensitive, they are the necessary data sources for performance profiling and optimization workflows.
  • [PROMPT_INJECTION]: The skill processes MariaDB slow query logs which represent an indirect prompt injection surface as logs may contain strings originating from untrusted database users. However, given the SRE use-case, this surface is inherent to the task of log analysis.
  • Ingestion points: /var/log/mysql/slow.log via the mysqldumpslow utility (described in workflows.md).
  • Boundary markers: None specified for log ingestion.
  • Capability inventory: Database schema modification (ALTER TABLE), site management (bench clear-cache), and service management (sudo systemctl).
  • Sanitization: No explicit sanitization or filtering is described for the log contents prior to analysis.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 31, 2026, 11:52 AM