proxmox-infrastructure
Pass
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The health monitoring tools
tools/check_ceph_health.pyandtools/check_cluster_health.pyutilize thesubprocess.runmodule to execute system commands on remote cluster nodes via SSH. These scripts are designed to gather cluster health metrics and perform diagnostics, which is a standard operational requirement for this type of infrastructure skill. - [EXTERNAL_DOWNLOADS]: Documentation and deployment workflows (e.g.,
reference/cloud-init-patterns.md) include instructions to fetch official Ubuntu cloud images fromcloud-images.ubuntu.com. These are well-known, trusted sources for operating system images used in VM template creation. - [CREDENTIALS_UNSAFE]: The skill's examples and documentation (e.g.,
examples/01-basic-vm/README.md) encourage users to configure sensitive Proxmox API tokens and passwords using environment variables. While this is a common practice for CLI-based infrastructure tools, it carries an inherent risk of accidental credential exposure in shell history or process logs if not managed securely. - [SAFE]: Destructive system commands such as
wipefs -aandlvremoveare documented in storage management and CEPH deployment guides. These commands are necessary for disk preparation and are appropriately context-bound, including safety mechanisms like theceph_wipe_disks: falseflag in Ansible playbooks to prevent unintended data loss.
Audit Metadata