tailwind-patterns

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: LOW
Full Analysis
  • [PROMPT_INJECTION] (SAFE): No instructions attempting to override agent behavior, bypass safety filters, or extract system prompts were detected. The content is purely instructional.
  • [DATA_EXFILTRATION] (SAFE): No sensitive file paths, hardcoded credentials, or network operations (e.g., curl, wget) are present. The skill does not interact with external endpoints.
  • [REMOTE_CODE_EXECUTION] (SAFE): There are no patterns involving remote script execution, dynamic code evaluation (eval/exec), or runtime package installations.
  • [OBFUSCATION] (SAFE): All text is plain-text Markdown. No Base64, zero-width characters, or homoglyph-based obfuscation techniques were identified.
  • [INDIRECT_PROMPT_INJECTION] (SAFE): While the skill defines principles for the agent to use when writing/editing files, it does not suggest ingesting untrusted external data in a way that would lead to instruction injection.
  • [PRIVILEGE_ESCALATION] (SAFE): The skill does not use administrative commands like sudo or attempt to modify system-level configurations or persistence mechanisms.
  • [NO_CODE] (INFO): This skill contains no logic-carrying scripts (Python, JS, Shell). It serves as a static knowledge base for the agent to reference during development tasks.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 17, 2026, 12:17 AM