monitoring-flower

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE] (SAFE): No malicious patterns such as prompt injection, obfuscation, or unauthorized data exfiltration were detected across the analyzed files.
  • [COMMAND_EXECUTION] (SAFE): The shell scripts start-flower.sh and test-flower.sh execute system commands (flower, curl, redis-cli) to manage the service. While start-flower.sh uses unquoted variable expansion for the final command execution (exec $FLOWER_CMD), which is generally discouraged, in this specific context it serves to pass arguments to the monitoring tool and does not present a direct remote code execution vulnerability under normal usage.
  • [CREDENTIALS_UNSAFE] (SAFE): The skill is designed to handle sensitive broker and authentication credentials securely. It utilizes os.getenv in Python and environment variables in Bash, avoids hardcoding secrets, and includes regex-based masking to hide passwords when printing the configuration summary.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:43 PM