mol
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The documentation in
references/TAURI_SETUP.mdincludes instructions to install the Rust toolchain viacurl ... https://sh.rustup.rs | sh. This is the official, well-known installer for the Rust programming language. - [EXTERNAL_DOWNLOADS]: The Invoicer application code in
invoicer/invoicer.view.tsdynamically loads standard libraries includinghtml2canvas,jspdf, andpdf.jsfromcdnjs.cloudflare.com. Cloudflare's CDN is a well-known and established service for web assets. - [COMMAND_EXECUTION]: The folder contains a developer utility script
invoicer/ralph.shdesigned to automate development tasks by invoking local AI agent CLIs (Claude and Codex). This script is intended for local environment management and does not influence the core agent skill behavior. - [SAFE]: All components, including the Invoicer bot and the FAQ Bot, perform their stated functions using standard APIs (Telegram Bot API, OpenAI-compatible endpoints). No evidence of credential exfiltration, persistence mechanisms, or obfuscation was found. The binary file
app/-/giper/baza/glob/glob.bazais a documented database pack format used by the $mol framework for initial data seeding.
Audit Metadata