aws-secrets-manager

Pass

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes standard AWS CLI commands (aws secretsmanager) and the jq utility to perform administrative tasks like listing, creating, and deleting secrets. These operations are consistent with the skill's stated purpose and use legitimate system binaries.\n- [CREDENTIALS_UNSAFE]: No actual sensitive credentials or private keys are hardcoded in the skill. The examples provided for creating and updating secrets use dummy placeholder values (e.g., 's3cret', 'n3wpass') for demonstration. The skill properly requires authentication via environment variables (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY).
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 1, 2026, 05:13 AM