stripe-patterns

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOW
Full Analysis
  • [Prompt Injection] (SAFE): No instruction override patterns detected.
  • [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials found; templates correctly use placeholders and environment variables.
  • [Obfuscation] (SAFE): No encoded or hidden content detected.
  • [Unverifiable Dependencies] (SAFE): Dependencies are restricted to reputable packages for payment processing.
  • [Privilege Escalation] (SAFE): No privilege escalation patterns identified.
  • [Persistence Mechanisms] (SAFE): No persistence techniques found.
  • [Metadata Poisoning] (SAFE): Metadata is accurate and non-deceptive.
  • [Indirect Prompt Injection] (SAFE): Mandatory evidence chain: 1. Ingestion points: 'metadata' and 'description' fields in 'templates/checkout_session.py' and 'templates/payment_intent.py'. 2. Boundary markers: Absent. 3. Capability inventory: 'Bash' and 'Write' for local environment setup. 4. Sanitization: Absent (handled by Stripe SDK). Risk is rated SAFE as ingested strings are treated as data, not instructions.
  • [Time-Delayed / Conditional Attacks] (SAFE): No conditional triggers detected.
  • [Dynamic Execution] (SAFE): No unsafe dynamic execution found; script file generation is limited to static templates.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 08:45 AM