sqlalchemy-2-async

Pass

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: LOW
Full Analysis
  • PROMPT_INJECTION (SAFE): No patterns of prompt injection, instruction overrides, or safety bypass attempts were detected in the documentation or comments.
  • DATA_EXFILTRATION (SAFE): The skill does not access sensitive local files or perform unauthorized network requests. Database connection examples use standard development placeholders.
  • REMOTE_CODE_EXECUTION (SAFE): No remote code execution vectors, such as arbitrary script downloads or dynamic evaluations, were found.
  • COMMAND_EXECUTION (SAFE): The scripts are limited to database ORM operations and do not use system-level command execution utilities like subprocess or os.system.
  • OBFUSCATION (SAFE): All files are written in clear text with no evidence of encoding, hidden characters, or homoglyph-based evasion techniques.
  • CREDENTIALS_UNSAFE (SAFE): Connection string examples (e.g., 'user:pass@localhost') are clearly generic placeholders and do not expose real production credentials.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 15, 2026, 09:52 PM