debug-gdb-openocd
Pass
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses Python's subprocess module to invoke local debugging tools including openocd and various GDB variants to perform firmware debugging. Evidence is found in scripts/gdb_debugger.py where it calls these binaries to perform environment detection and execute debug sessions.
- [COMMAND_EXECUTION]: The skill script dynamically generates and executes temporary GDB scripts to automate debugging workflows such as loading firmware and inspecting registers. The generate_gdb_script function in scripts/gdb_debugger.py creates strings of commands which are saved to temporary files and executed.
Audit Metadata