menu-debug

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [PROMPT_INJECTION] (SAFE): No instructions found that attempt to override AI behavior, bypass safety filters, or extract system prompts. The content is strictly technical and instructional.
  • [DATA_EXPOSURE] (SAFE): No hardcoded credentials, API keys, or sensitive local paths (like SSH keys or AWS configs) were detected. File paths mentioned (e.g., menu_layout_algorithm.cpp) are standard source code paths for the OpenHarmony project.
  • [REMOTE_CODE_EXECUTION] (SAFE): No patterns of remote script execution (e.g., curl/wget piped to bash) or package installations were found.
  • [COMMAND_EXECUTION] (SAFE): While the skill suggests shell commands (grep, cat), these are intended for manual log analysis by the user on their own local log files and do not include high-risk parameters or privilege escalation.
  • [INDIRECT_PROMPT_INJECTION] (LOW): The skill possesses a data ingestion surface as it processes user-provided bug reports to suggest diagnostic paths. However, it lacks automated execution capabilities (it only provides templates for the user to apply), and no unsafe interpolation was found.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:34 PM