ruview-hardware-setup
Warn
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides detailed instructions for the agent to execute Python scripts via
python -cthat spawn subprocesses usingsubprocess.run. These scripts are used to invoke the ESP-IDF build system and flashing tools. - [COMMAND_EXECUTION]: The use of multi-line Python scripts passed directly to the interpreter's command line is a form of dynamic code execution. While intended to resolve environment compatibility issues with the ESP-IDF toolchain on Windows, this pattern allows for the execution of arbitrary logic within the local environment.
- [COMMAND_EXECUTION]: The provided scripts contain hardcoded absolute file paths pointing to a specific user's directory (
C:\Users\ruv\...). This practice exposes the local directory structure and may cause execution failures or unintended file access if the skill is used on a system with a different user configuration.
Audit Metadata