debug-gdb-openocd

Pass

Audited by Gen Agent Trust Hub on Apr 19, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses Python's subprocess module to invoke local debugging tools including openocd and various GDB variants to perform firmware debugging. Evidence is found in scripts/gdb_debugger.py where it calls these binaries to perform environment detection and execute debug sessions.
  • [COMMAND_EXECUTION]: The skill script dynamically generates and executes temporary GDB scripts to automate debugging workflows such as loading firmware and inspecting registers. The generate_gdb_script function in scripts/gdb_debugger.py creates strings of commands which are saved to temporary files and executed.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 19, 2026, 06:24 AM