skills/tenzir/skills/tenzir-docs/Gen Agent Trust Hub

tenzir-docs

Pass

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The documentation provides a full technical reference for high-privilege operators designed for data pipeline extension.
  • shell operator: Documented in reference/operators/shell.md as a way to execute system commands by spawning a subprocess.
  • python operator: Documented in reference/operators/python.md as a method to execute Python code for complex transformations, including support for pip-based requirements.
  • [EXTERNAL_DOWNLOADS]: The documentation references official vendor installation scripts and repositories.
  • Official installer: Mentions curl https://get.tenzir.app | sh in guides/installation.md for Linux deployments.
  • Vendor Repositories: Links to official source code and packages at github.com/tenzir/* and raw.githubusercontent.com/tenzir/* throughout the guides.
  • Well-Known Services: Includes installation instructions for trusted third-party services like ClickHouse (clickhouse.com).
  • [SAFE]: The documentation skill contains no malicious code or active prompt injection patterns.
  • Credential Management: All examples involving sensitive keys (AWS IAM, Splunk HEC, etc.) use explicit placeholders like AKIA...EXAMPLE or the built-in secret() function, adhering to security best practices.
  • Data Ingestion Surface: While the engine is described as processing untrusted external data (Category 8), the skill itself is purely informative and provides the necessary guidance for secure normalization using schemas like OCSF.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 14, 2026, 07:38 AM