openocd
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runandsubprocess.Popenin several scripts (openocd_run.py,openocd_gdb.py,openocd_telnet.py,openocd_itm.py, andopenocd_semihosting.py) to executeopenocdandarm-none-eabi-gdb. This is the intended primary purpose of the skill for hardware interaction. - [COMMAND_EXECUTION]: The
rawsubcommand inscripts/openocd_run.pyallows passing arbitrary command sequences to OpenOCD. The script includes a safety check that prevents the execution of raw commands whenoperation_modeis set to a high-security level (3). - [DATA_EXFILTRATION]: The scripts use Python's
socketmodule to connect tolocalhost(127.0.0.1) on specific ports (default 3333, 3443, 4444) to communicate with the GDB server, Telnet interface, and trace ports. This network activity is confined to the local machine and is required for the tool's functionality. - [SAFE]: No evidence of prompt injection, obfuscation, hardcoded credentials, or data exfiltration to remote servers was found in the provided files.
Audit Metadata