grpc-python

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGH
Full Analysis
  • [Prompt Injection] (SAFE): No instructions designed to override agent behavior, bypass safety filters, or extract system prompts were detected in the documentation or code comments.- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials or access to sensitive system file paths were found. While development snippets use insecure channels, the 'production-checklist.md' explicitly mandates TLS and authentication for production environments.- [Remote Code Execution] (SAFE): No patterns of downloading and executing remote scripts (e.g., curl|bash) were found. The code generation process using 'protoc' is a standard, safe development workflow.- [Unverifiable Dependencies] (LOW): The skill references standard, well-known Python packages (grpcio, grpcio-tools, structlog). The dependency 'grpcio-health-checking' is a standard extension of the gRPC ecosystem.- [False Positive Analysis] (INFO): The automated scan alert identifying 'logger.info' as a malicious URL is a false positive; the scanner misidentified a standard Python method call for a URL pattern.- [Indirect Prompt Injection] (SAFE): The skill defines clear boundaries for untrusted data by promoting the use of proto3 schemas and explicit validation using 'google.rpc.error_details'.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 12:20 AM