build-platformio
Pass
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runto execute PlatformIO commands such aspio runandpio device list. These calls are implemented using list-based arguments, which prevents shell injection vulnerabilities. The executable names are resolved using standard system path lookups (shutil.which). - [DATA_EXPOSURE]: File system interactions are limited to reading the
platformio.iniconfiguration file via the standardconfigparsermodule and walking the project's build directory (.pio/build/) to identify firmware artifacts (ELF, HEX, BIN). No access to sensitive system directories or user credentials was detected. - [REMOTE_CODE_EXECUTION]: There are no patterns involving downloading and executing remote scripts, nor is there any usage of unsafe dynamic execution functions like
eval()orexec()on untrusted input.
Audit Metadata