testing-unit
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes dynamic context injection (shell commands executed at load time via the
!commandsyntax) within its scaffolding scripts located in thescripts/directory. These commands are used to auto-detect project context, such as identifying the active test framework inpackage.json, searching for existing fixtures or handlers, and checking the Python version. These operations are performed using standard utilities likegrep,find, andwc, and do not inject user-supplied arguments into the shell execution, making the implementation safe. - [EXTERNAL_DOWNLOADS]: References to external resources are limited to official documentation (mswjs.io, GitHub), common testing libraries, and placeholder examples for API endpoints. There are no instructions for downloading or executing scripts from untrusted remote sources.
- [DATA_EXFILTRATION]: The skill does not contain any patterns for accessing or transmitting sensitive data. It explicitly promotes security best practices by including rules and checklists for filtering sensitive information, such as authorization headers and API keys, from test recordings (VCR cassettes).
Audit Metadata