stet
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of the
stetCLI tool and standard development utilities includinggit,docker,gh,npm,pnpm, anduv. This execution is central to its purpose as a CI/evaluation orchestrator and is consistent with managing repository workflows. - [EXTERNAL_DOWNLOADS]: Instructions are provided for adding the skill via
npx skills addand updating the tool usingstet update. These operations target the author's official GitHub repository (github.com/benredmond/stet-dist), which is classified as a vendor-owned resource. - [CREDENTIALS_UNSAFE]: The skill manages sensitive credentials, such as
CLAUDE_CODE_OAUTH_TOKENandCODEX_LB_API_KEY. It explicitly instructs the agent to store these in~/.config/stet/claude-oauth-tokenwith0600(user-only) permissions and to avoid exporting them in global shell profiles or repository-local environment files, aligning with secure configuration practices. - [PROMPT_INJECTION]: Static detectors flagged potential concealment patterns (e.g., instructions to prioritize JSON automation over human-facing terminal mirrors). Analysis confirms these are benign technical instructions designed to ensure data integrity and reliable parsing for the agent, rather than attempts to hide malicious behavior from the human operator.
Audit Metadata