menu-debug
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION] (SAFE): No instructions found that attempt to override AI behavior, bypass safety filters, or extract system prompts. The content is strictly technical and instructional.
- [DATA_EXPOSURE] (SAFE): No hardcoded credentials, API keys, or sensitive local paths (like SSH keys or AWS configs) were detected. File paths mentioned (e.g., menu_layout_algorithm.cpp) are standard source code paths for the OpenHarmony project.
- [REMOTE_CODE_EXECUTION] (SAFE): No patterns of remote script execution (e.g., curl/wget piped to bash) or package installations were found.
- [COMMAND_EXECUTION] (SAFE): While the skill suggests shell commands (grep, cat), these are intended for manual log analysis by the user on their own local log files and do not include high-risk parameters or privilege escalation.
- [INDIRECT_PROMPT_INJECTION] (LOW): The skill possesses a data ingestion surface as it processes user-provided bug reports to suggest diagnostic paths. However, it lacks automated execution capabilities (it only provides templates for the user to apply), and no unsafe interpolation was found.
Audit Metadata