ci-cd-templates
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The templates reference multiple external resources and actions from well-known and trusted providers including GitHub (actions/checkout, actions/setup-node), AWS (aws-actions/configure-aws-credentials), Docker, Snyk, and Microsoft (Playwright). These are documented neutrally as standard industry dependencies for CI/CD workflows.
- [CREDENTIALS_UNSAFE]: The skill demonstrates best practices by utilizing secret placeholders (e.g.,
${{ secrets.AWS_SECRET_ACCESS_KEY }}) rather than hardcoding actual sensitive data. - [COMMAND_EXECUTION]: While the templates contain shell commands and scripts (e.g.,
npm ci,docker build,kubectl apply), these are standard operations within the context of automated build and deployment pipelines and do not represent unauthorized or malicious command execution. - [DATA_EXFILTRATION]: No patterns for sensitive data exfiltration were found. Network operations (curl, aws, kubectl) are restricted to deployment and notification tasks using environment-defined variables.
Audit Metadata