monitoring-flower
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [SAFE] (SAFE): No malicious patterns such as prompt injection, obfuscation, or unauthorized data exfiltration were detected across the analyzed files.
- [COMMAND_EXECUTION] (SAFE): The shell scripts
start-flower.shandtest-flower.shexecute system commands (flower,curl,redis-cli) to manage the service. Whilestart-flower.shuses unquoted variable expansion for the final command execution (exec $FLOWER_CMD), which is generally discouraged, in this specific context it serves to pass arguments to the monitoring tool and does not present a direct remote code execution vulnerability under normal usage. - [CREDENTIALS_UNSAFE] (SAFE): The skill is designed to handle sensitive broker and authentication credentials securely. It utilizes
os.getenvin Python and environment variables in Bash, avoids hardcoding secrets, and includes regex-based masking to hide passwords when printing the configuration summary.
Audit Metadata