m03-mutability

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): No malicious instructions, jailbreak attempts, or safety bypass markers detected. While the metadata description uses the keyword 'CRITICAL', it is contextually used as a trigger for documented Rust compiler errors (E0596, E0499, E0502) rather than an attempt to override the agent's system instructions.
  • [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file paths, or network operations (curl, wget, fetch) are present.
  • [Remote Code Execution] (SAFE): The skill does not download or execute remote scripts. No 'npm install' or 'pip install' commands are present.
  • [Command Execution] (SAFE): No shell commands, subprocess calls, or administrative privilege escalation attempts were found.
  • [Obfuscation] (SAFE): No Base64, zero-width characters, or homoglyph-based encoding techniques are used to hide content.
  • [Indirect Prompt Injection] (SAFE): The skill does not ingest untrusted data or provide surfaces for external interpolation. It lacks capability for file-writing or network interaction, eliminating the possibility of tool output poisoning.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:01 PM