java-jpa-hibernate

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): No instructions attempting to override agent behavior or bypass safety filters were found in the skill or documentation.\n- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file access, or unauthorized network operations were identified. Use of environment variables for statistics is standard.\n- [Obfuscation] (SAFE): All content is in clear text; no Base64, zero-width characters, or other obfuscation techniques are present.\n- [Unverifiable Dependencies & Remote Code Execution] (SAFE): The validation script uses standard Python libraries and safe YAML loading (yaml.safe_load). No remote scripts are downloaded or executed.\n- [Command Execution] (SAFE): While the skill manifest requests the Bash tool, the provided scripts do not execute arbitrary or dangerous commands.\n- [Indirect Prompt Injection] (SAFE): The skill is designed to analyze Java code but does not implement unsafe data interpolation or execution patterns.\n- [Dynamic Execution] (SAFE): No runtime compilation or dynamic loading of untrusted code was detected.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 04:58 PM