moodle-coding-standards

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): No override or bypass markers were detected.
  • [Data Exposure & Exfiltration] (SAFE): No access to sensitive files or network exfiltration patterns found.
  • [Obfuscation] (SAFE): No Base64, zero-width characters, or hex escapes detected.
  • [Unverifiable Dependencies & Remote Code Execution] (SAFE): No remote scripts or unknown packages are downloaded. The validation command references phpcs, which is a standard local linting tool.
  • [Privilege Escalation] (SAFE): No sudo, chmod, or other privilege escalation commands found.
  • [Persistence Mechanisms] (SAFE): No attempts to modify shell profiles or create scheduled tasks were detected.
  • [Metadata Poisoning] (SAFE): Metadata fields are accurate and consistent with the code quality purpose of the skill.
  • [Indirect Prompt Injection] (SAFE): The skill processes PHP code files for linting. (Evidence: 1. Ingestion points: User-provided PHP files in Moodle directories; 2. Boundary markers: Absent; 3. Capability inventory: Local execution of phpcs linter; 4. Sanitization: Implicitly handled by the static analysis tool).
  • [Time-Delayed / Conditional Attacks] (SAFE): No conditional logic gating dangerous operations was detected.
  • [Dynamic Execution] (SAFE): No runtime code generation or unsafe deserialization found.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:14 PM