lazycat-developer-expert
Pass
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill documents several mechanisms for executing commands within the platform's containerized environment, including
setup_script(executed with root privileges),buildscriptfor application packaging, and theexec://routing protocol for running binary files. These are documented as core platform features for application initialization and deployment.\n- [EXTERNAL_DOWNLOADS]: Instructions include fetching container images from the official platform registry (registry.lazycat.cloud) and well-known registries likelscr.io(LinuxServer.io). These sources are consistent with the skill's purpose of managing containerized applications.\n- [CREDENTIALS_UNSAFE]: The documentation provides guidance on implementing OIDC authentication and generating API Auth Tokens for automated tasks. It correctly recommends using environment variables for managing sensitive secrets and utilizes platform-provided CLI tools (hc,lzc-cli) for credential management.\n- [DATA_EXFILTRATION]: No suspicious or unauthorized data exfiltration patterns were identified. All network configuration instructions (upstreams, routes, ingress) are focused on defining legitimate application connectivity and service availability.\n- [SAFE]: The skill acts as a documentation repository and development assistant for a specific platform. All high-privilege operations described are scoped to the application containers and are presented within the context of standard development workflows for that platform.
Audit Metadata