angular-di
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- Prompt Injection (SAFE): No instructions found that attempt to override agent behavior or bypass safety guidelines. The content is purely instructional and technical.
- Data Exposure & Exfiltration (SAFE): No hardcoded credentials or sensitive file paths were detected. Code examples use standard placeholders like 'https://api.example.com' and local paths like '/api/users'.
- Unverifiable Dependencies & Remote Code Execution (SAFE): The skill references standard, trusted Angular framework packages (@angular/core, @angular/common/http). No remote script execution patterns (e.g., curl|bash) or untrusted package installations were found.
- Obfuscation (SAFE): No encoded strings, zero-width characters, or homoglyphs were detected.
- Dynamic Execution (SAFE): Uses standard Angular features like 'runInInjectionContext' and 'createEnvironmentInjector' for dependency management. These are internal framework mechanisms and do not represent arbitrary shell or OS-level code execution.
- Privilege Escalation & Persistence (SAFE): No commands related to privilege escalation (sudo) or maintaining access (cron/bashrc) were identified.
Audit Metadata