grc-block-query

Pass

Audited by Gen Agent Trust Hub on Apr 28, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Fetches GNU Radio block definitions from official repositories and technical documentation sites. Analysis of query_grc_blocks.py confirms that network requests are restricted to an allowlist of reputable domains including api.github.com/repos/gnuradio/, wiki.gnuradio.org, and www.ettus.com. These downloads are used to populate a local structured database and ensure the agent uses verified technical parameters.
  • [COMMAND_EXECUTION]: Includes a PowerShell bootstrap script (bootstrap_shared_grc_skill.ps1) designed to automate the installation of the skill across multiple agent platforms (Codex, Copilot, Claude Code). The script manages file copying and environment variable configuration (e.g., GRC_RADIOCONDA_PATH) to ensure consistent behavior across different user projects.
  • [DATA_EXFILTRATION]: While the skill communicates with external servers, the data sent is limited to search queries for public GNU Radio block names and field identifiers. These operations are performed via urllib.request and are directed only toward official project-related infrastructure.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 28, 2026, 02:43 AM