tenzir-docs
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [DATA_EXFILTRATION]: The documentation describes authorized access to local configuration files, such as AWS credentials, for the purpose of cloud authentication. These are standard features of the engine and are explained in the context of legitimate data source integration.
- [COMMAND_EXECUTION]: Multiple files detail the use of 'shell' and 'python' operators. These are documented as 'escape hatches' for advanced users to run system commands or custom logic within their data pipelines.
- [REMOTE_CODE_EXECUTION]: Installation guides include examples of fetching and running setup scripts from Tenzir's official domain and other well-known services like Clickhouse. These are standard patterns for the deployment of the tools described.
- [EXTERNAL_DOWNLOADS]: The documentation refers to various external packages and repositories for installation and extensions, pointing to official registries such as PyPI and npm, and official vendor GitHub accounts.
Audit Metadata