rust-webapp

Fail

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: CRITICAL
Full Analysis
  • SAFE (SAFE): No malicious behaviors identified. The skill utilizes trusted open-source libraries and standard development patterns for Axum and SQLx handlers.\n- Indirect Prompt Injection (LOW): The generated application architecture establishes a surface for processing untrusted user data through HTTP forms. Evidence: 1. Ingestion points: assets/templates/create.html and edit.html. 2. Boundary markers: Askama template engine auto-escapes HTML content. 3. Capability inventory: SQL database interactions and dynamic HTML rendering. 4. Sanitization: Documentation mandates the use of parameterized sqlx macros to prevent SQL injection vulnerabilities.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 19, 2026, 10:58 AM