cron-jobs

Pass

Audited by Gen Agent Trust Hub on Mar 15, 2026

Risk Level: SAFE
Full Analysis
  • Implementation of Security Checks: The skill provides clear instructions and code examples for securing cron job endpoints by verifying an authorization header against a CRON_SECRET environment variable. This is a standard security practice to prevent unauthorized access to internal functions.
  • Standard Configuration Guidance: The patterns and rules described (cron syntax, plan limits, path requirements) align with official documentation and represent expected behavior for this functionality.
  • No Malicious Patterns Detected: A review of the instructions and metadata shows no signs of prompt injection, data exfiltration, or unauthorized command execution. The skill operates within the context of helping a developer configure their own application settings.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 15, 2026, 06:29 PM