ansible
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [SAFE]: The skill is configured correctly for infrastructure management using environment variables for authentication. No hardcoded secrets, obfuscation, or unauthorized network activity was detected.
- [COMMAND_EXECUTION]: The skill executes
ansibleandansible-playbookcommands locally. This is a primary function of the skill and is documented as the intended behavior for infrastructure configuration. - [INDIRECT_PROMPT_INJECTION]: The skill processes external files and variables which represents a standard vulnerability surface for automation tools. \n
- Ingestion points: Reads from local
inventory.ymlandplaybook.ymlfiles, and acceptsextra_varsfor API calls. \n - Boundary markers: No delimiters or explicit instructions to ignore embedded commands are present in the prompt templates. \n
- Capability inventory: The skill has the ability to execute shell commands via Ansible and perform network requests via
curl. \n - Sanitization: No specific validation or escaping of input data is defined within the skill itself.
Audit Metadata