openocd

Pass

Audited by Gen Agent Trust Hub on May 9, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses subprocess.run and subprocess.Popen in several scripts (openocd_run.py, openocd_gdb.py, openocd_telnet.py, openocd_itm.py, and openocd_semihosting.py) to execute openocd and arm-none-eabi-gdb. This is the intended primary purpose of the skill for hardware interaction.
  • [COMMAND_EXECUTION]: The raw subcommand in scripts/openocd_run.py allows passing arbitrary command sequences to OpenOCD. The script includes a safety check that prevents the execution of raw commands when operation_mode is set to a high-security level (3).
  • [DATA_EXFILTRATION]: The scripts use Python's socket module to connect to localhost (127.0.0.1) on specific ports (default 3333, 3443, 4444) to communicate with the GDB server, Telnet interface, and trace ports. This network activity is confined to the local machine and is required for the tool's functionality.
  • [SAFE]: No evidence of prompt injection, obfuscation, hardcoded credentials, or data exfiltration to remote servers was found in the provided files.
Audit Metadata
Risk Level
SAFE
Analyzed
May 9, 2026, 09:54 AM