infra-deploy

Warn

Audited by Gen Agent Trust Hub on Feb 27, 2026

Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [CREDENTIALS_UNSAFE]: Sensitive environment variables such as DATABASE_URL, NEXTAUTH_SECRET, and ENCRYPTION_KEY are passed to the gcloud run deploy command via the --set-env-vars flag. This practice can expose sensitive data to other users on the system via process monitoring tools like ps.
  • [CREDENTIALS_UNSAFE]: The skill executes a curl command that includes the CALCOM_API_KEY directly in the URL query string. Secrets in URLs are often captured in server logs, proxy logs, or browser history.
  • [COMMAND_EXECUTION]: The skill makes extensive use of the Bash tool to perform sensitive system operations, including building Docker containers, managing cloud infrastructure, and executing database migrations.
  • [EXTERNAL_DOWNLOADS]: The skill pulls official Docker images for Cal.com and PostgreSQL and uses npx to run Prisma, which involves downloading packages from the npm registry.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 27, 2026, 02:19 AM