sniffable-python

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOW
Full Analysis
  • [PROMPT_INJECTION] (SAFE): No instructions designed to override AI safety guardrails or system prompts were detected. The content is purely educational.
  • [DATA_EXFILTRATION] (SAFE): No code performing network requests, file reading, or credential harvesting is present. The methodology describes potential file reading but provides no implementation.
  • [OBFUSCATION] (SAFE): The files consist of clear markdown and YAML with no hidden characters, Base64 encoding, or homoglyphs.
  • [EXTERNAL_DOWNLOADS] (SAFE): There are no references to package managers (pip, npm) or remote script execution (curl|bash).
  • [INDIRECT_PROMPT_INJECTION] (LOW): The methodology encourages agents to read and act upon content found in Python file headers. While this creates a potential surface for injection if an agent reads a malicious script, the skill itself is a passive set of guidelines and does not provide an automated tool that executes untrusted content.
  • [DYNAMIC_EXECUTION] (SAFE): No use of eval(), exec(), or runtime compilation techniques.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 09:26 AM