rust-ops
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: Extensive review of the skill's instructions and reference files reveals no malicious patterns. The content is strictly educational and intended to assist with Rust programming tasks.
- [PROMPT_INJECTION]: No attempts to override agent behavior, bypass safety guidelines, or extract system prompts were found in any of the analyzed files.
- [CREDENTIALS_UNSAFE]: While the documentation includes database connection strings (e.g., postgres://user:pass@localhost/db), these are clearly identified as illustrative placeholders for local development and do not represent actual sensitive credentials.
- [COMMAND_EXECUTION]: The skill documentation includes common
cargoandbashcommands. These are standard for Rust project initialization, building, and testing, and are used appropriately within the scope of a developer tool. - [EXTERNAL_DOWNLOADS]: The skill mentions numerous popular and trusted Rust libraries (crates) such as
tokio,serde, andaxum. These references occur within the context of standard dependency management viacargoand do not involve suspicious remote scripts or unverifiable sources.
Audit Metadata