bluesky
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFE
Full Analysis
- [DATA_EXFILTRATION]: The skill implements secure credential management practices.
- Evidence: In
scripts/bsky.py, thesave_configfunction appliesos.chmod(CONFIG_PATH, 0o600)to the configuration file, ensuring it is only accessible by the current user. - Evidence: The
cmd_logincommand is designed to store only the session token returned by the server, explicitly avoiding the storage of the user's app password on disk. - [EXTERNAL_DOWNLOADS]: The skill uses official and well-known libraries for its functionality.
- Evidence: The
requirements.txtfile specifiesatproto, which is the recognized library for the AT Protocol. Dependencies are managed via standard package registries. - [COMMAND_EXECUTION]: Static analysis detected
subprocess.runcalls, but they are limited to the test environment. - Evidence: In
tests/test_cli.py,subprocess.runis used to execute the localbsky.pyscript for unit testing purposes (e.g., checking the--versionand--helpflags). This does not involve unsanitized user input in the production code path. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection, which is managed at a safe level for its intended purpose.
- Ingestion points: The skill reads external data from the Bluesky network via
cmd_timeline,cmd_search, andcmd_notificationsinscripts/bsky.py. - Boundary markers: Output is printed as plain text without specialized boundary delimiters.
- Capability inventory: The agent can post and delete content on behalf of the user.
- Sanitization: While the skill does not implement natural language sanitization for the feed content it displays, this is a standard characteristic of social media clients and does not represent a malicious design in the skill itself.
Audit Metadata