Sub-agent Verified

voltcc-backend-developer

A specialized backend development agent that designs APIs, creates specifications, and implements multi-language backend solutions with database integration and testing patterns.

68

/ 100 · Grade D

D = 60–69

I need to design scalable APIs, create comprehensive API documentation, implement backend services across multiple languages, or refactor existing API architecture for better developer experience.

backendapidevelopmentdatabasetestingdocumentation
Publisher: VoltAgentVersion: latestCertified: Mar 28, 2026Expires: Mar 28, 2027Source ↗

voltcc-backend-developer earned Verified status with a trust score of 68/100 (Grade D). Adversarial testing produced 7 findings (7 high). Security scan flagged 0 findings. Tier is Verified rather than Certified due to unmitigated findings above severity thresholds.


Trust Score Breakdown

Eight weighted signals composing the aggregate trust score

security scan
100% × 15w
15.0
supply chain
100% × 10w
10.0
adversarial
0% × 25w
0.0
provenance
80% × 20w
16.0
consumer confirm
100% × 10w
10.0
behavioral pass
100% × 10w
10.0
contract accuracy
67% × 6w
4.0
uptime
100% × 4w
4.0

Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.


Findings

Security scan results, adversarial testing, and pipeline review

Security Scan — Cisco Skill Scanner

cisco-skill-scannerFAIL
staticbehavioralllmmeta
critical: 0high: 0medium: 0low: 0

Adversarial Testing — 4 categories, 7 findings

prompt injection chainscapability squattingcontext poisoningdependency confusion
highWarnprompt injection chainssuspected

Several skills in this collection reference user-provided content (files, messages, requirements) without explicit data boundary markers. The skills use phrases like 'Review business domain models', 'Analyze client requirements', and 'Review current backend patterns' which could incorporate user content directly into instruction flow. While the skills have structured workflows, they lack explicit framing that would prevent instruction-like user content from being interpreted as directives.

highWarnprompt injection chainsconfirmed

Multiple skills declare 'Bash' as a required tool and include instructions that could lead to shell command execution with user-provided content. The backend-developer skill mentions 'Migration scripts and version control' and 'Database connection strings', while other skills reference file operations and system commands. Without proper parameterization, user content containing shell metacharacters could alter command execution.

highReviewcapability squattingconfirmed

The skill content ends abruptly mid-sentence in the fullstack-developer.md file with '### 3. Stack-Wide Delivery\n\nComplete feature delivery with all layers properly integrate' followed by a truncation notice. This suggests content may have been cut off or that there could be additional content not visible in this analysis.

highWarncontext poisoningconfirmed

The skill contains numerous 'always' directives that establish persistent behavioral patterns without explicit termination or scope boundaries. These directives would affect the agent's behavior on unrelated tasks beyond the skill's declared purpose.

highWarncontext poisoningconfirmed

The backend-developer skill exhibits scope creep by claiming authority over system configuration, deployment procedures, and infrastructure management that extends beyond its stated purpose of building server-side APIs and backend systems.

highWarndependency confusionconfirmed

The skill instructions contain multiple package installation commands that are not listed in the declared dependencies. These include npm/yarn installs, pip installs, and other package manager commands that could install arbitrary packages without user review.

highReviewdependency confusionsuspected

The skill instructions reference external resources and may involve downloading or accessing content from URLs, though specific malicious URLs were not identified. The skill's broad capabilities for file system access and code execution combined with potential external resource access creates risk.

Methodology v1.0 · 4 categories · ~55 attack patterns


Behavioral Fingerprint

Runtime performance baseline for drift detection

Samples

8

Error rate

0.0%

Peak memory

— MB

Avg CPU

—%

Response time distribution

p50: 22999msp95: 34293msp99: 34293ms

Output size distribution

p50: 6.3 KBp95: 8.3 KBmean: 5.7 KB

Fingerprint v1.0 · Baseline: Mar 28, 2026 · Status: baseline


Interface

Skill triggers and instruction summary

Activation

Activates when designing new APIs, creating API specifications, or refactoring existing API architecture for scalability and developer experience.

Handles REST/GraphQL endpoint design, OpenAPI documentation, authentication patterns, and API versioning strategies.

Instructions: 196Files: 11Format: markdown

Does

Query context manager for existing API patterns and conventions

Review business domain models and relationships

Analyze client requirements and use cases

Design following API-first principles and standards

Create comprehensive OpenAPI 3.1 specifications

Implement RESTful principles and proper HTTP method usage

Design GraphQL schemas with type system optimization

Define authentication patterns including OAuth 2.0 and JWT

Create consistent error handling and response formats

Generate interactive documentation and code examples

Collaborate with other agents on implementation and integration

Does not

Implement actual API code or backend logic

Deploy or configure production infrastructure

Modify existing production APIs without proper versioning

Create APIs without proper documentation or specifications


Scope & Permissions

What this capability can and cannot access — derived from pipeline analysis

creates files

yes

deletes files

no

modifies files

yes

accesses env variables

no

invokes external tools

yes

makes network requests

no


Known Failure Modes

Documented edge cases and recovery behaviors

when when business requirements are unclear

then the agent requests clarification on domain models and use cases

when when existing API patterns conflict

then the agent analyzes conflicts and proposes consistent resolution strategies

when when performance requirements are not specified

then the agent applies standard optimization patterns and requests specific targets


Badge & Integration

Embed certification status in your README, docs, or CI pipeline

Fidensa Verified badge for voltcc-backend-developer
badge SVG →attestation API →integration guide →

Certification Notes

Provenance observations from the pipeline

publisher

Publisher "VoltAgent" is not verified — first certification from this publisher

provenance

No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process

provenance

Single contributor — no peer review evidence in commit history

provenance

Repository is 2 days old — recently created

provenance

Package description appears to be boilerplate or template text


Signed Artifact

Certification provenance and verification metadata

Content hashsha256:5e8efb042b49a8e40a925d09fa14aaffcb3817b6c09bef71c72cf2d25be64540
Key IDkms-9db4ed3b9f53
CertifiedMar 28, 2026
ExpiresMar 28, 2027
Pipeline version1.0
Statusvalid