zwave-js

Pass

Audited by Gen Agent Trust Hub on Mar 18, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE]: The skill consists entirely of informational documentation and common administration patterns for Z-Wave hardware management. No malicious behaviors, obfuscation, or safety bypasses were detected.
  • [EXTERNAL_DOWNLOADS]: The skill references the official zwavejs/zwave-js-ui Docker image and provides links to the official zwave-js project on GitHub. These are well-known and trusted sources within the home automation community.
  • [COMMAND_EXECUTION]: Includes instructions for standard system tasks using tools like systemctl, docker, and mosquitto_pub/sub. These are legitimate and necessary for the stated purpose of configuring and troubleshooting a Z-Wave gateway.
  • [CREDENTIALS_UNSAFE]: Uses safe placeholders such as changeme_use_a_long_random_string and !secret mqtt_password in example configuration files, following standard documentation best practices to avoid hardcoding actual credentials.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 18, 2026, 01:37 PM