android-data-persistence

Pass

Audited by Gen Agent Trust Hub on Feb 22, 2026

Risk Level: SAFE
Full Analysis
  • [DATA_EXPOSURE] (SAFE): The skill provides code for storing authentication tokens and API keys. Crucially, it recommends using EncryptedSharedPreferences for sensitive data and warns about device-specific initialization failures (Samsung/Knox), which is a developer best practice.
  • [COMMAND_EXECUTION] (SAFE): The Room database examples in room-essentials.md use named bind parameters (e.g., :userId, :email) for all @Query annotations. This is the correct method to prevent SQL injection vulnerabilities.
  • [EXTERNAL_DOWNLOADS] (SAFE): The skill references several dependencies from the androidx namespace (androidx.datastore, androidx.security, androidx.room). These are official, trusted libraries provided by Google for Android development.
  • [PROMPT_INJECTION] (SAFE): No instructions attempting to override agent behavior, bypass safety filters, or extract system prompts were detected in the markdown or code comments.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 22, 2026, 07:49 PM