angular-di

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • Prompt Injection (SAFE): No instructions found that attempt to override agent behavior or bypass safety guidelines. The content is purely instructional and technical.
  • Data Exposure & Exfiltration (SAFE): No hardcoded credentials or sensitive file paths were detected. Code examples use standard placeholders like 'https://api.example.com' and local paths like '/api/users'.
  • Unverifiable Dependencies & Remote Code Execution (SAFE): The skill references standard, trusted Angular framework packages (@angular/core, @angular/common/http). No remote script execution patterns (e.g., curl|bash) or untrusted package installations were found.
  • Obfuscation (SAFE): No encoded strings, zero-width characters, or homoglyphs were detected.
  • Dynamic Execution (SAFE): Uses standard Angular features like 'runInInjectionContext' and 'createEnvironmentInjector' for dependency management. These are internal framework mechanisms and do not represent arbitrary shell or OS-level code execution.
  • Privilege Escalation & Persistence (SAFE): No commands related to privilege escalation (sudo) or maintaining access (cron/bashrc) were identified.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 04:35 PM