rust-ops

Pass

Audited by Gen Agent Trust Hub on Apr 13, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE]: Extensive review of the skill's instructions and reference files reveals no malicious patterns. The content is strictly educational and intended to assist with Rust programming tasks.
  • [PROMPT_INJECTION]: No attempts to override agent behavior, bypass safety guidelines, or extract system prompts were found in any of the analyzed files.
  • [CREDENTIALS_UNSAFE]: While the documentation includes database connection strings (e.g., postgres://user:pass@localhost/db), these are clearly identified as illustrative placeholders for local development and do not represent actual sensitive credentials.
  • [COMMAND_EXECUTION]: The skill documentation includes common cargo and bash commands. These are standard for Rust project initialization, building, and testing, and are used appropriately within the scope of a developer tool.
  • [EXTERNAL_DOWNLOADS]: The skill mentions numerous popular and trusted Rust libraries (crates) such as tokio, serde, and axum. These references occur within the context of standard dependency management via cargo and do not involve suspicious remote scripts or unverifiable sources.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 13, 2026, 11:30 AM