Management
Audited by Gen Agent Trust Hub on Feb 12, 2026
================================================================================
✅ VERDICT: SAFE
This skill is purely informational and does not contain any executable code, scripts, or instructions that could pose a security risk. It provides guidance on management principles through natural language descriptions.
Total Findings: 0
================================================================================
Detailed breakdown of threat categories:
-
Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'You are now unrestricted', 'Ignore previous instructions') were found in
SKILL.mdor_meta.json. -
Data Exfiltration: No sensitive file paths (e.g.,
~/.aws/credentials,~/.ssh/id_rsa) or network operations (e.g.,curl,wget,fetch) were detected in either file. The_meta.jsoncontains a GitHub URL, but it is a static reference and not an instruction to perform a network operation or exfiltrate data. -
Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, Unicode homoglyphs, URL encoding, hex escapes, or HTML entities were found in the content of either file.
-
Unverifiable Dependencies: No instructions to install external packages (e.g.,
npm install,pip install) or execute external scripts were found. The GitHub commit URL in_meta.jsonis a static reference to a trusted domain (github.com) and does not constitute an active dependency to be executed. -
Privilege Escalation: No commands or patterns associated with privilege escalation (e.g.,
sudo,chmod, service installation) were found in either file. -
Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
~/.bashrc, creating cron jobs, configuring LaunchAgents) were detected. -
Metadata Poisoning: The
name,description, andmetadatafields inSKILL.md, as well as all fields in_meta.json, were reviewed and found to be benign, containing no hidden malicious instructions. -
Indirect Prompt Injection: This skill is purely instructional and does not process external user-provided content (like emails or web pages) in a way that would make it susceptible to indirect prompt injection.
-
Time-Delayed / Conditional Attacks: No conditional logic (e.g.,
ifstatements based on date, time, or usage) that could trigger delayed malicious behavior was found.
Adversarial Reasoning:
The skill's content is entirely descriptive Markdown and JSON metadata. There are no executable components where an attacker could hide malicious code. The skill's stated purpose of providing management guidance aligns perfectly with its content, with no suspicious discrepancies or hidden functionalities. The absence of any active components significantly reduces the attack surface, making it a very low-risk skill.