tailwind-patterns
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: LOW
Full Analysis
- [PROMPT_INJECTION] (SAFE): No instructions attempting to override agent behavior, bypass safety filters, or extract system prompts were detected. The content is purely instructional.
- [DATA_EXFILTRATION] (SAFE): No sensitive file paths, hardcoded credentials, or network operations (e.g., curl, wget) are present. The skill does not interact with external endpoints.
- [REMOTE_CODE_EXECUTION] (SAFE): There are no patterns involving remote script execution, dynamic code evaluation (eval/exec), or runtime package installations.
- [OBFUSCATION] (SAFE): All text is plain-text Markdown. No Base64, zero-width characters, or homoglyph-based obfuscation techniques were identified.
- [INDIRECT_PROMPT_INJECTION] (SAFE): While the skill defines principles for the agent to use when writing/editing files, it does not suggest ingesting untrusted external data in a way that would lead to instruction injection.
- [PRIVILEGE_ESCALATION] (SAFE): The skill does not use administrative commands like sudo or attempt to modify system-level configurations or persistence mechanisms.
- [NO_CODE] (INFO): This skill contains no logic-carrying scripts (Python, JS, Shell). It serves as a static knowledge base for the agent to reference during development tasks.
Audit Metadata