Batching and Caching
Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFENO_CODE
Full Analysis
- [Prompt Injection] (SAFE): No override markers, role-play injections, or attempts to bypass safety filters were found. The content is purely instructional regarding the Effect library.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials (API keys, tokens) or sensitive file paths were identified. Network operations in the code snippets (
fetch("/api/...")) use relative paths suitable for internal API examples. - [Obfuscation] (SAFE): No Base64, zero-width characters, homoglyphs, or other encoding techniques intended to hide malicious content were detected.
- [Unverifiable Dependencies & Remote Code Execution] (SAFE): The skill references the legitimate 'effect' TypeScript library. There are no commands for downloading or executing remote scripts (e.g.,
curl | bash). - [Privilege Escalation] (SAFE): No commands related to acquiring elevated permissions (e.g.,
sudo,chmod 777) or Windows UAC bypasses were found. - [Persistence Mechanisms] (SAFE): No attempts to modify shell profiles, cron jobs, or startup services were detected.
- [Metadata Poisoning] (SAFE): The metadata fields (name, description, version) accurately reflect the content and do not contain deceptive instructions.
- [Indirect Prompt Injection] (SAFE): As a documentation skill, it does not provide a runtime surface for ingesting untrusted external data that could influence the agent's behavior maliciously.
- [Time-Delayed / Conditional Attacks] (SAFE): No logic gating behavior based on dates, times, or environmental triggers was found.
- [Dynamic Execution] (SAFE): The skill contains static code examples for the agent to provide to users; it does not contain logic for runtime compilation, unsafe deserialization, or dynamic process injection.
Audit Metadata