flash-platformio
Pass
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/pio_flasher.pyexecutes thepioCLI tool usingsubprocess.runto perform firmware uploads. It uses a list of arguments rather than a shell string, which is a secure practice that prevents shell injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The skill requires the PlatformIO core (CLI) to be pre-installed on the host system. It does not perform any unauthorized or hidden downloads of external scripts or binaries.
- [DYNAMIC_EXECUTION]: The script
scripts/pio_flasher.pydynamically modifiessys.pathto import helper modules from a sibling directory (build-platformio). This is a common pattern for sharing code between related local skills and does not involve executing untrusted or remote code. - [INDIRECT_PROMPT_INJECTION]: The skill parses
platformio.inifiles to determine build environments. While this involves processing user-controlled files, the data is used strictly for constructing CLI arguments for the trustedpiotool and does not influence the agent's behavior in a malicious way.
Audit Metadata