doc-sys-autopilot
Pass
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses standard shell utilities including
ls,find, andgrepto locate and parse documentation files within the project structure. It also invokes local Python scripts such asvalidate_sys.pyandupdate_traceability_matrix.pylocated in theai_dev_ssd_flowdirectory to perform validation and matrix updates. These operations are restricted to the local environment and are consistent with the skill's stated purpose of document automation. - [DATA_EXFILTRATION]: No network operations or attempts to access sensitive system credentials (e.g., SSH keys, environment variables) were found. The skill only interacts with project-specific documentation folders.
- [PROMPT_INJECTION]: The instructions focus entirely on technical workflow phases and document structure. There are no patterns suggesting attempts to bypass safety filters or override the agent's core instructions.
- [EXTERNAL_DOWNLOADS]: The skill does not perform any external downloads or package installations during execution.
- [REMOTE_CODE_EXECUTION]: No remote code execution patterns, such as piping curled scripts into a shell, were identified.
Audit Metadata