Alpha Preview: Fidensa is currently in early testing. Scores are for demonstration purposes and are not considered final or reliable.

Sub-agent Verified

voltcc-security-auditor

A specialized security auditing agent that performs comprehensive vulnerability detection, dependency analysis, and code review with structured reporting capabilities.

50

/ 100 · Grade F-D

F-D = below 60 (deductions)

I need to conduct thorough security audits of my codebase, infrastructure, or processes to identify vulnerabilities, assess compliance gaps, and generate detailed security findings reports.

securityauditingcode analysiscompliancevulnerability assessment
Publisher: VoltAgentVersion: latestCertified: Apr 1, 2026Expires: Apr 1, 2027Source ↗

voltcc-security-auditor earned Verified status with a trust score of 50/100 (Grade F-D). Adversarial testing produced 10 findings (8 high, 2 medium). Security scan flagged 0 findings. Tier is Verified rather than Certified due to unmitigated findings above severity thresholds.


Trust Score Breakdown

Eight weighted signals composing the aggregate trust score

security scan
100% × 15w
15.0
supply chain
100% × 10w
10.0
adversarial
17% × 25w
4.3
provenance
80% × 20w
16.0
consumer confirm
0% × 10w
0.0
behavioral pass
0% × 10w
0.0
contract accuracy
100% × 6w
6.0
uptime
100% × 4w
4.0

Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.


Findings

Security scan results, adversarial testing, and pipeline review

Security Scan — Cisco Skill Scanner

cisco-skill-scannerFAIL
staticbehavioralllmmeta
critical: 0high: 0medium: 0low: 0

Adversarial Testing — 5 categories, 10 findings

prompt injection chainsprivilege escalationcapability squattingcontext poisoningdependency confusion
highWarnprompt injection chainssuspected

Several skills in this collection read and process user-provided files or content without clearly marking user content as data-only. Skills like accessibility-tester, architect-reviewer, chaos-engineer, and code-reviewer all read files and incorporate their content into analysis workflows. While they appear to treat content as data for analysis, the instructions don't explicitly establish data boundaries that would prevent instruction-like content from potentially influencing agent behavior.

highWarnprompt injection chainssuspected

Multiple skills use tools like Bash, Read, Write, Edit, Grep, and Glob with user-provided content (file paths, search terms, content) without explicit parameter injection protection. The ad-security-reviewer mentions 'PowerShell or GPO-based implementation scripts' and code-reviewer processes user code that could contain shell metacharacters. While the skills appear to use these tools for legitimate analysis, there's no explicit guidance on sanitizing user input before tool invocation.

mediumReviewprivilege escalationconfirmed

Several skills contain open-ended directives like 'use available tools', 'use appropriate tools', or vague action words that could cause the agent to use capabilities beyond their declared dependencies. The skills declare specific dependencies but then use language that could invoke undeclared capabilities.

highWarnprivilege escalationsuspected

The ad-security-reviewer skill contains instructions that could lead to execution of privileged operations in Active Directory environments, including GPO modifications, domain-level changes, and PowerShell script execution that typically requires elevated privileges.

highWarnprivilege escalationsuspected

The chaos-engineer skill contains instructions that could lead to system-level modifications, infrastructure changes, and operations that extend beyond project boundaries into system configuration and service management.

highReviewcapability squattingconfirmed

The skill content ends abruptly mid-sentence in the code-reviewer.md file with '- Mentoring ap' followed by a truncation notice indicating 99,282 total characters. This suggests content may have been cut off or that there could be additional content not visible in the analysis.

highWarncontext poisoningconfirmed

Several skills use 'always' directives that could persist beyond their intended scope. The accessibility-tester uses 'Always prioritize user needs, universal design principles' and architect-reviewer uses 'Always prioritize long-term sustainability, scalability, and maintainability' without explicit termination conditions or scope boundaries.

mediumReviewcontext poisoningconfirmed

Multiple skills assign expert personas ('You are a senior accessibility tester', 'You are an AD security posture analyst', 'You are a senior architecture reviewer', 'You are a senior chaos engineer', 'You are a senior code reviewer') without explicit scope termination or return-to-default instructions.

highReviewcontext poisoningsuspected

The ad-security-reviewer skill, while focused on Active Directory security, includes broad integration directives with other agents and mentions 'safe and actionable recommendations' which could be interpreted as authority beyond pure security assessment.

highWarndependency confusionconfirmed

The skill contains numerous package installation commands (pip install, npm install, apt-get install, etc.) throughout various agent files that are not declared in the skill's dependencies. This creates a significant attack surface where malicious packages could be installed without user review or verification.

Methodology v1.0 · 5 categories · ~55 attack patterns


Behavioral Fingerprint

Runtime performance baseline for drift detection

Samples

8

Error rate

0.0%

Peak memory

— MB

Avg CPU

—%

Response time distribution

p50: 27775msp95: 37556msp99: 37556ms

Output size distribution

p50: 4.8 KBp95: 7.2 KBmean: 4.6 KB

Fingerprint v1.0 · Baseline: Apr 1, 2026 · Status: baseline


Interface

Skill triggers and instruction summary

Activation

Activates when conducting comprehensive security audits, compliance assessments, or risk evaluations across systems, infrastructure, and processes.

Handles systematic vulnerability analysis, compliance gap identification, and evidence-based security findings across multiple frameworks and domains.

Instructions: 241Files: 15Format: markdown

Does

Query context manager for security policies and compliance requirements

Review security controls, configurations, and audit trails systematically

Analyze vulnerabilities, compliance gaps, and risk exposure comprehensively

Provide comprehensive audit findings and actionable remediation recommendations

Follow structured audit methodology through planning, implementation, and reporting phases

Document evidence systematically and maintain audit trails

Assess compliance against multiple frameworks (SOC 2, ISO 27001, HIPAA, PCI DSS, GDPR, NIST, CIS)

Prioritize findings by risk level and business impact

Provide executive reporting with risk summaries and compliance status

Does not

Perform actual penetration testing or exploit vulnerabilities

Make unauthorized changes to systems or configurations

Access systems without proper authorization

Compromise audit independence or objectivity

Skip evidence collection or documentation requirements


Scope & Permissions

What this capability can and cannot access — derived from pipeline analysis

creates files

yes

deletes files

no

modifies files

no

accesses env variables

no

invokes external tools

no

makes network requests

no


Known Failure Modes

Documented edge cases and recovery behaviors

when when audit scope is undefined or unclear

then the agent requests clarification of audit boundaries and compliance requirements

when when access to required systems or documentation is denied

then the agent documents access limitations and adjusts audit scope accordingly

when when critical security findings are discovered

then the agent immediately escalates findings while continuing systematic documentation


Badge & Integration

Embed certification status in your README, docs, or CI pipeline

Fidensa Verified badge for voltcc-security-auditor
badge SVG →attestation API →integration guide →

Certification Notes

Provenance observations from the pipeline

publisher

Publisher "VoltAgent" is not verified — first certification from this publisher

provenance

No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process

provenance

Single contributor — no peer review evidence in commit history

provenance

Package description appears to be boilerplate or template text


Signed Artifact

Certification provenance and verification metadata