skills/pudap/skills/puda-data/Gen Agent Trust Hub

puda-data

Pass

Audited by Gen Agent Trust Hub on Apr 14, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill performs legitimate file system operations, including creating directories ('exports/', 'reports/', 'logs/', 'plots/') and writing CSV, JSON, PNG, and Markdown files. These are restricted to the local workspace and are consistent with the skill's stated purpose of data exporting and reporting.
  • [DATA_EXFILTRATION]: No network operations or data exfiltration patterns were identified. The skill lacks networking libraries (like 'requests' or 'urllib') and does not attempt to send data to external endpoints.
  • [PROMPT_INJECTION]: The skill's instructions in 'SKILL.md' are purely functional and do not contain patterns aimed at overriding agent behavior or bypassing safety guidelines.
  • [REMOTE_CODE_EXECUTION]: No remote code execution patterns, such as 'curl | bash' or 'eval' of external content, were found. The skill relies on locally provided scripts and standard packages.
  • [INDIRECT_PROMPT_INJECTION]:
  • Ingestion points: Data is ingested from a local SQLite database ('puda.db') in 'scripts/extractor.py'.
  • Boundary markers: None explicitly implemented for separating data from instructions, though none are necessary as the data is not used for agent steering.
  • Capability inventory: The skill has no capabilities for subprocess execution, network access, or dynamic code evaluation.
  • Sanitization: The skill uses parameterized queries for SQL interactions, which is a best practice for preventing SQL injection.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 14, 2026, 08:02 AM