screenkite-clean-cut
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runinscripts/apply_cuts.pyto interact with the localscreenkite-alphaCLI tool. This is performed using a list of arguments rather than a shell string, which is a secure practice that prevents command injection. - [EXTERNAL_DOWNLOADS]: The skill uses
uvto manage therequestslibrary dependency.requestsis a standard, well-known package used for the transcription tasks. This is considered safe as it utilizes a trusted package registry and established tooling. - [CREDENTIALS_UNSAFE]: The documentation mentions using
ELEVEN_LABS_API_KEYbut correctly instructs the user or agent to manage it via environment variables or.envfiles rather than hardcoding. This aligns with security best practices for secret management. - [SAFE]: The core logic in
scripts/compute_all_cuts.pyinvolves processing JSON-formatted transcription data to identify cut points. The script uses safe string processing and JSON parsing, with no evidence of dynamic code execution (likeevalorexec).
Audit Metadata