zwave-js
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill consists entirely of informational documentation and common administration patterns for Z-Wave hardware management. No malicious behaviors, obfuscation, or safety bypasses were detected.
- [EXTERNAL_DOWNLOADS]: The skill references the official
zwavejs/zwave-js-uiDocker image and provides links to the officialzwave-jsproject on GitHub. These are well-known and trusted sources within the home automation community. - [COMMAND_EXECUTION]: Includes instructions for standard system tasks using tools like
systemctl,docker, andmosquitto_pub/sub. These are legitimate and necessary for the stated purpose of configuring and troubleshooting a Z-Wave gateway. - [CREDENTIALS_UNSAFE]: Uses safe placeholders such as
changeme_use_a_long_random_stringand!secret mqtt_passwordin example configuration files, following standard documentation best practices to avoid hardcoding actual credentials.
Audit Metadata