emergency-manager
Pass
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: The skill contains no instructions aimed at overriding agent behavior, bypassing safety filters, or extracting system prompts. It uses standard instructional language to define a professional persona.
- [CREDENTIALS_UNSAFE]: No hardcoded API keys, tokens, passwords, or private keys were found. References to security incidents are contextually appropriate for emergency management.
- [DATA_EXFILTRATION]: There are no commands or scripts that access sensitive local files or perform network requests. All data processing is confined to the conversational context.
- [EXTERNAL_DOWNLOADS]: No external scripts, binaries, or configuration files are downloaded or executed. References to FEMA and IAEM are for informational purposes only.
- [REMOTE_CODE_EXECUTION]: No patterns for remote code execution, such as piping network content to a shell or using dynamic evaluation of remote strings, are present.
- [COMMAND_EXECUTION]: The skill does not invoke shell commands, subprocesses, or system-level utilities. It is a text-based persona.
- [OBFUSCATION]: No Base64, hex-encoding, zero-width characters, or other obfuscation techniques were detected in the instructions or metadata.
- [PERSISTENCE_MECHANISMS]: The skill does not attempt to modify system startup files, cron jobs, or registry keys to maintain persistence.
- [DYNAMIC_EXECUTION]: No runtime code generation, unsafe deserialization, or dynamic loading of modules from computed paths was found.
- [DYNAMIC_CONTEXT_INJECTION]: No use of the dynamic command execution syntax (!
command) was found in the SKILL.md or associated files.
Audit Metadata