moodle-coding-standards
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Prompt Injection] (SAFE): No override or bypass markers were detected.
- [Data Exposure & Exfiltration] (SAFE): No access to sensitive files or network exfiltration patterns found.
- [Obfuscation] (SAFE): No Base64, zero-width characters, or hex escapes detected.
- [Unverifiable Dependencies & Remote Code Execution] (SAFE): No remote scripts or unknown packages are downloaded. The validation command references
phpcs, which is a standard local linting tool. - [Privilege Escalation] (SAFE): No sudo, chmod, or other privilege escalation commands found.
- [Persistence Mechanisms] (SAFE): No attempts to modify shell profiles or create scheduled tasks were detected.
- [Metadata Poisoning] (SAFE): Metadata fields are accurate and consistent with the code quality purpose of the skill.
- [Indirect Prompt Injection] (SAFE): The skill processes PHP code files for linting. (Evidence: 1. Ingestion points: User-provided PHP files in Moodle directories; 2. Boundary markers: Absent; 3. Capability inventory: Local execution of
phpcslinter; 4. Sanitization: Implicitly handled by the static analysis tool). - [Time-Delayed / Conditional Attacks] (SAFE): No conditional logic gating dangerous operations was detected.
- [Dynamic Execution] (SAFE): No runtime code generation or unsafe deserialization found.
Audit Metadata