php-modernization
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill is a well-structured and documented set of tools for PHP codebase modernization. It adheres to best practices and provides clear guidance for developers.
- [COMMAND_EXECUTION]: The Python scripts
introspect.py,verify_php_project.py, andmodernize_loop.pyutilizesubprocess.runto call PHP binaries (e.g.,php,phpstan,rector,php-cs-fixer). These calls are performed using lists and target standard executable paths within the project'svendor/binor.Build/bindirectories. This behavior is necessary and appropriate for the skill's functionality. - [DATA_EXPOSURE]: The skill reads project-specific configuration and source files. It does not perform unauthorized network transmissions or exfiltrate sensitive data. Security audits are performed locally via
composer audit. - [INDIRECT_PROMPT_INJECTION]: The skill processes external code and configuration, which presents a surface for indirect prompt injection.
- Ingestion points: PHP source files (
src/,Classes/,tests/) andcomposer.jsonproject metadata are processed for analysis and refactoring. - Boundary markers: Absent. The scripts do not use specific delimiters to isolate external content during analysis.
- Capability inventory: The skill has the capability to write to the file system and execute shell commands through the identified PHP tooling binaries.
- Sanitization: Absent. Content is processed as-is for static analysis and linting.
Audit Metadata