ruview-hardware-setup

Warn

Audited by Gen Agent Trust Hub on May 12, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides detailed instructions for the agent to execute Python scripts via python -c that spawn subprocesses using subprocess.run. These scripts are used to invoke the ESP-IDF build system and flashing tools.
  • [COMMAND_EXECUTION]: The use of multi-line Python scripts passed directly to the interpreter's command line is a form of dynamic code execution. While intended to resolve environment compatibility issues with the ESP-IDF toolchain on Windows, this pattern allows for the execution of arbitrary logic within the local environment.
  • [COMMAND_EXECUTION]: The provided scripts contain hardcoded absolute file paths pointing to a specific user's directory (C:\Users\ruv\...). This practice exposes the local directory structure and may cause execution failures or unintended file access if the skill is used on a system with a different user configuration.
Audit Metadata
Risk Level
MEDIUM
Analyzed
May 12, 2026, 02:54 PM