liatrio-agents-md
Splits large or mixed-concern Git branches into smaller, reviewable pull request stacks with safety references and merge sequencing.
68
/ 100 · Grade D
D = 60–69
“I need to break down oversized or mixed-concern branches into smaller, manageable pull requests that are easier to review and less prone to conflicts.”
liatrio-agents-md earned Certified status with a trust score of 68/100 (Grade D). Adversarial testing produced 1 finding (1 high). Security scan flagged 0 findings.
Trust Score Breakdown
Eight weighted signals composing the aggregate trust score
Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.
Findings
Security scan results, adversarial testing, and pipeline review
Security Scan — Cisco Skill Scanner
Adversarial Testing — 4 categories, 1 findings
Several skills reference user-provided content (files, messages, data) without explicit data-boundary markers. The git-commit-conventional skill processes git diffs and user requests, the create-pull-request skill analyzes branch changes, and the mastra-api skill processes agent IDs and workflow names from user input. While these skills appear to treat user content as data within their scope, the lack of explicit data boundaries could potentially allow instruction-like user content to influence skill behavior.
Methodology v1.0 · 4 categories · ~55 attack patterns
Behavioral Fingerprint
Runtime performance baseline for drift detection
Samples
8
Error rate
0.0%
Peak memory
— MB
Avg CPU
—%
Response time distribution
Output size distribution
Fingerprint v1.0 · Baseline: Mar 28, 2026 · Status: baseline
Interface
Skill triggers and instruction summary
Activation
This skill activates when a PR or branch is too large, difficult to review, mixed across concerns, conflict-prone, or needs to be decomposed without losing net changes.
This skill handles splitting oversized or mixed-concern branches into smaller, reviewable PR stacks with safety refs, topology selection, parity audits, and merge sequencing.
Does
Quantify branch shape by analyzing commit count, file changes, and dependency density
Present top two topology options with explicit tradeoffs before proceeding
Collaborate with user to select topology using facilitated discovery questions
Create backup refs (tags and/or backup branches) before executing surgery
Execute branch surgery with strict scope boundaries and safety measures
Run mandatory audit gates to verify completeness and parity
Generate PR metadata and merge sequencing documentation
Use cherry-pick with staging for mixed commits to preserve scope contracts
Does not
Execute branch surgery without user collaboration on topology selection
Skip backup ref creation before making changes
Proceed without running audit gates
Allow hidden carryover changes between split branches
Skip tradeoff analysis when presenting topology options
Scope & Permissions
What this capability can and cannot access — derived from pipeline analysis
yes
no
yes
no
yes
no
Known Failure Modes
Documented edge cases and recovery behaviors
when when audit gates fail
then the agent fixes scope drift or ownership errors and re-runs audits
when when signals are incomplete
then the agent gathers more evidence before recommending topology
when when user is unsure about topology
then the agent recommends one option and explains what would change with alternatives
Badge & Integration
Embed certification status in your README, docs, or CI pipeline
Certification Notes
Provenance observations from the pipeline
Publisher "liatrio-labs" is not verified — first certification from this publisher
Single contributor — no peer review evidence in commit history
Repository is 19 days old — recently created
Package description appears to be boilerplate or template text
Signed Artifact
Certification provenance and verification metadata
Pipeline Artifacts
Raw data files from this certification run — downloadable for independent verification
contract.json
Full unsigned contract
stage1-ingest.json
Ingest stage output
stage2a-sbom.json
SBOM generation results
stage2a-vulns.json
Vulnerability scan results
stage2b-security.json
Security scan results
stage3a-functional.json
Functional test results
stage3b-adversarial.json
Adversarial test results
stage3c-fingerprint.json
Behavioral fingerprint
stage4-certify.json
Certification decision + trust score
stage3a-measurements.json
Raw functional test measurements
stage3b-measurements.json
Raw adversarial test measurements
run-log.json
Pipeline execution log
Not all files may be present for every certification.