apscheduler

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): No instructions attempting to bypass safety filters or override agent behavior were detected.- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials or sensitive file path access were found. Database connection examples use standard placeholders.- [Obfuscation] (SAFE): No encoded commands, zero-width characters, or homoglyphs were present in the documentation.- [Unverifiable Dependencies & Remote Code Execution] (SAFE): References the well-known apscheduler package. No suspicious remote script execution patterns (e.g., curl|bash) were found.- [Persistence Mechanisms] (SAFE): The documented persistence features (SQLAlchemy, Redis) are standard for task scheduling and do not represent malicious host persistence.- [Indirect Prompt Injection] (SAFE): The skill defines task scheduling logic but does not create a surface for ingesting and executing untrusted external instructions.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:12 PM