gcp-cloud-run
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOW
Full Analysis
- [EXTERNAL_DOWNLOADS] (INFO): The skill references container images and packages from trusted Google sources.
- Evidence: Uses
gcr.io/cloud-builders/docker,gcr.io/google.com/cloudsdktool/cloud-sdk, andgcr.io/distroless/nodejs20-debian12. These fall under [TRUST-SCOPE-RULE] for the Google organization. - [INDIRECT_PROMPT_INJECTION] (INFO): The provided patterns for Express.js and Cloud Run Functions ingest untrusted data from HTTP request bodies, queries, and Pub/Sub messages.
- Ingestion points:
req.params.idinsrc/index.js,req.query.nameandreq.body.namein the HTTP Function snippet. - Boundary markers: None present in the boilerplate code.
- Capability inventory: The skill provides instructions for deploying resources via
gcloudandcloudbuild.yamlwhich can create public-facing endpoints (--allow-unauthenticated). - Sanitization: No explicit input sanitization is shown in the snippets (common for educational templates). Users should implement validation and sanitization when adapting this code for production.
- [COMMAND_EXECUTION] (LOW): Includes
gcloudCLI commands and Cloud Build configuration for deployment. - Finding: The commands are standard administrative operations for the GCP platform and do not contain malicious payloads or obfuscation.
Audit Metadata