stripe-patterns
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOW
Full Analysis
- [Prompt Injection] (SAFE): No instruction override patterns detected.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials found; templates correctly use placeholders and environment variables.
- [Obfuscation] (SAFE): No encoded or hidden content detected.
- [Unverifiable Dependencies] (SAFE): Dependencies are restricted to reputable packages for payment processing.
- [Privilege Escalation] (SAFE): No privilege escalation patterns identified.
- [Persistence Mechanisms] (SAFE): No persistence techniques found.
- [Metadata Poisoning] (SAFE): Metadata is accurate and non-deceptive.
- [Indirect Prompt Injection] (SAFE): Mandatory evidence chain: 1. Ingestion points: 'metadata' and 'description' fields in 'templates/checkout_session.py' and 'templates/payment_intent.py'. 2. Boundary markers: Absent. 3. Capability inventory: 'Bash' and 'Write' for local environment setup. 4. Sanitization: Absent (handled by Stripe SDK). Risk is rated SAFE as ingested strings are treated as data, not instructions.
- [Time-Delayed / Conditional Attacks] (SAFE): No conditional triggers detected.
- [Dynamic Execution] (SAFE): No unsafe dynamic execution found; script file generation is limited to static templates.
Audit Metadata