sniffable-python
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOW
Full Analysis
- [PROMPT_INJECTION] (SAFE): No instructions designed to override AI safety guardrails or system prompts were detected. The content is purely educational.
- [DATA_EXFILTRATION] (SAFE): No code performing network requests, file reading, or credential harvesting is present. The methodology describes potential file reading but provides no implementation.
- [OBFUSCATION] (SAFE): The files consist of clear markdown and YAML with no hidden characters, Base64 encoding, or homoglyphs.
- [EXTERNAL_DOWNLOADS] (SAFE): There are no references to package managers (pip, npm) or remote script execution (curl|bash).
- [INDIRECT_PROMPT_INJECTION] (LOW): The methodology encourages agents to read and act upon content found in Python file headers. While this creates a potential surface for injection if an agent reads a malicious script, the skill itself is a passive set of guidelines and does not provide an automated tool that executes untrusted content.
- [DYNAMIC_EXECUTION] (SAFE): No use of eval(), exec(), or runtime compilation techniques.
Audit Metadata