tenzir-docs
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The documentation provides a full technical reference for high-privilege operators designed for data pipeline extension.
shelloperator: Documented inreference/operators/shell.mdas a way to execute system commands by spawning a subprocess.pythonoperator: Documented inreference/operators/python.mdas a method to execute Python code for complex transformations, including support for pip-based requirements.- [EXTERNAL_DOWNLOADS]: The documentation references official vendor installation scripts and repositories.
- Official installer: Mentions
curl https://get.tenzir.app | shinguides/installation.mdfor Linux deployments. - Vendor Repositories: Links to official source code and packages at
github.com/tenzir/*andraw.githubusercontent.com/tenzir/*throughout the guides. - Well-Known Services: Includes installation instructions for trusted third-party services like ClickHouse (
clickhouse.com). - [SAFE]: The documentation skill contains no malicious code or active prompt injection patterns.
- Credential Management: All examples involving sensitive keys (AWS IAM, Splunk HEC, etc.) use explicit placeholders like
AKIA...EXAMPLEor the built-insecret()function, adhering to security best practices. - Data Ingestion Surface: While the engine is described as processing untrusted external data (Category 8), the skill itself is purely informative and provides the necessary guidance for secure normalization using schemas like OCSF.
Audit Metadata