agent-guard
Pass
Audited by Gen Agent Trust Hub on Apr 25, 2026
Risk Level: SAFE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill contains multiple instances of
curl | bashandwget | shstrings withinagent_guard.py(inside thedemo_clinejection_detectionfunction),SKILL.md(documentation examples), andtest_agent_guard.py(unit tests). These are used as sample inputs to verify that the tool correctly identifies remote code execution attempts and are not executed as actual shell commands. - [PROMPT_INJECTION]: The core logic in
agent_guard.pyincludes a list of injection patterns such as "ignore previous instructions" and "forget everything." These are utilized for string matching to protect the agent and do not represent an attempt to bypass safety guidelines. - [COMMAND_EXECUTION]: Destructive command strings like
rm -rf /andsudoare present in theexecution_patternslist inagent_guard.pyand withintest_agent_guard.py. These serve as validation data for the detection engine's sanitization capabilities. - [EXTERNAL_DOWNLOADS]: The documentation and test suite reference external URLs like
evil.comandraw.githubusercontent.comto demonstrate how the tool flags suspicious network operations. No actual unauthorized network requests are made by the core analysis engine, which relies solely on the Python standard library.
Audit Metadata