proxmox-infrastructure

Pass

Audited by Gen Agent Trust Hub on Apr 15, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
  • [COMMAND_EXECUTION]: The health monitoring tools tools/check_ceph_health.py and tools/check_cluster_health.py utilize the subprocess.run module to execute system commands on remote cluster nodes via SSH. These scripts are designed to gather cluster health metrics and perform diagnostics, which is a standard operational requirement for this type of infrastructure skill.
  • [EXTERNAL_DOWNLOADS]: Documentation and deployment workflows (e.g., reference/cloud-init-patterns.md) include instructions to fetch official Ubuntu cloud images from cloud-images.ubuntu.com. These are well-known, trusted sources for operating system images used in VM template creation.
  • [CREDENTIALS_UNSAFE]: The skill's examples and documentation (e.g., examples/01-basic-vm/README.md) encourage users to configure sensitive Proxmox API tokens and passwords using environment variables. While this is a common practice for CLI-based infrastructure tools, it carries an inherent risk of accidental credential exposure in shell history or process logs if not managed securely.
  • [SAFE]: Destructive system commands such as wipefs -a and lvremove are documented in storage management and CEPH deployment guides. These commands are necessary for disk preparation and are appropriately context-bound, including safety mechanisms like the ceph_wipe_disks: false flag in Ansible playbooks to prevent unintended data loss.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 15, 2026, 12:13 PM