lazycat-developer-expert

Pass

Audited by Gen Agent Trust Hub on Apr 3, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill documents several mechanisms for executing commands within the platform's containerized environment, including setup_script (executed with root privileges), buildscript for application packaging, and the exec:// routing protocol for running binary files. These are documented as core platform features for application initialization and deployment.\n- [EXTERNAL_DOWNLOADS]: Instructions include fetching container images from the official platform registry (registry.lazycat.cloud) and well-known registries like lscr.io (LinuxServer.io). These sources are consistent with the skill's purpose of managing containerized applications.\n- [CREDENTIALS_UNSAFE]: The documentation provides guidance on implementing OIDC authentication and generating API Auth Tokens for automated tasks. It correctly recommends using environment variables for managing sensitive secrets and utilizes platform-provided CLI tools (hc, lzc-cli) for credential management.\n- [DATA_EXFILTRATION]: No suspicious or unauthorized data exfiltration patterns were identified. All network configuration instructions (upstreams, routes, ingress) are focused on defining legitimate application connectivity and service availability.\n- [SAFE]: The skill acts as a documentation repository and development assistant for a specific platform. All high-privilege operations described are scoped to the application containers and are presented within the context of standard development workflows for that platform.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 3, 2026, 10:42 AM