Batching and Caching

Pass

Audited by Gen Agent Trust Hub on Feb 21, 2026

Risk Level: SAFENO_CODE
Full Analysis
  • [Prompt Injection] (SAFE): No override markers, role-play injections, or attempts to bypass safety filters were found. The content is purely instructional regarding the Effect library.
  • [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials (API keys, tokens) or sensitive file paths were identified. Network operations in the code snippets (fetch("/api/...")) use relative paths suitable for internal API examples.
  • [Obfuscation] (SAFE): No Base64, zero-width characters, homoglyphs, or other encoding techniques intended to hide malicious content were detected.
  • [Unverifiable Dependencies & Remote Code Execution] (SAFE): The skill references the legitimate 'effect' TypeScript library. There are no commands for downloading or executing remote scripts (e.g., curl | bash).
  • [Privilege Escalation] (SAFE): No commands related to acquiring elevated permissions (e.g., sudo, chmod 777) or Windows UAC bypasses were found.
  • [Persistence Mechanisms] (SAFE): No attempts to modify shell profiles, cron jobs, or startup services were detected.
  • [Metadata Poisoning] (SAFE): The metadata fields (name, description, version) accurately reflect the content and do not contain deceptive instructions.
  • [Indirect Prompt Injection] (SAFE): As a documentation skill, it does not provide a runtime surface for ingesting untrusted external data that could influence the agent's behavior maliciously.
  • [Time-Delayed / Conditional Attacks] (SAFE): No logic gating behavior based on dates, times, or environmental triggers was found.
  • [Dynamic Execution] (SAFE): The skill contains static code examples for the agent to provide to users; it does not contain logic for runtime compilation, unsafe deserialization, or dynamic process injection.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 21, 2026, 09:01 PM