puda-data
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill performs legitimate file system operations, including creating directories ('exports/', 'reports/', 'logs/', 'plots/') and writing CSV, JSON, PNG, and Markdown files. These are restricted to the local workspace and are consistent with the skill's stated purpose of data exporting and reporting.
- [DATA_EXFILTRATION]: No network operations or data exfiltration patterns were identified. The skill lacks networking libraries (like 'requests' or 'urllib') and does not attempt to send data to external endpoints.
- [PROMPT_INJECTION]: The skill's instructions in 'SKILL.md' are purely functional and do not contain patterns aimed at overriding agent behavior or bypassing safety guidelines.
- [REMOTE_CODE_EXECUTION]: No remote code execution patterns, such as 'curl | bash' or 'eval' of external content, were found. The skill relies on locally provided scripts and standard packages.
- [INDIRECT_PROMPT_INJECTION]:
- Ingestion points: Data is ingested from a local SQLite database ('puda.db') in 'scripts/extractor.py'.
- Boundary markers: None explicitly implemented for separating data from instructions, though none are necessary as the data is not used for agent steering.
- Capability inventory: The skill has no capabilities for subprocess execution, network access, or dynamic code evaluation.
- Sanitization: The skill uses parameterized queries for SQL interactions, which is a best practice for preventing SQL injection.
Audit Metadata