cortex-code
Pass
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the local
cortexCLI using thesubprocessmodule. These calls are handled securely by passing arguments as a list rather than a shell string, which prevents command injection. Theexecute_cortex.pyscript further wraps this execution with a blocklist-based security model. - [SAFE]: Implements a comprehensive
PromptSanitizerthat automatically identifies and replaces personally identifiable information (PII) such as emails, phone numbers, and credit card patterns before they are processed. - [SAFE]: Includes a robust
ApprovalHandlerthat predicts necessary tools and requires explicit user consent before execution in its default 'prompt' mode, ensuring human-in-the-loop oversight. - [SAFE]: Features a structured
AuditLoggerthat records all execution events, routing decisions, and results to a local JSONL file with support for rotation and retention policies. - [SAFE]: Uses secure file handling practices, explicitly setting file and directory permissions to 0600/0700 to ensure that sensitive configurations and cached data are only accessible by the current user.
Audit Metadata