cron-jobs
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFE
Full Analysis
- Implementation of Security Checks: The skill provides clear instructions and code examples for securing cron job endpoints by verifying an authorization header against a CRON_SECRET environment variable. This is a standard security practice to prevent unauthorized access to internal functions.
- Standard Configuration Guidance: The patterns and rules described (cron syntax, plan limits, path requirements) align with official documentation and represent expected behavior for this functionality.
- No Malicious Patterns Detected: A review of the instructions and metadata shows no signs of prompt injection, data exfiltration, or unauthorized command execution. The skill operates within the context of helping a developer configure their own application settings.
Audit Metadata