building-tauri-with-github-actions

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [REMOTE_CODE_EXECUTION] (CRITICAL): Detected use of curl | sh to execute code from https://sh.rustup.rs. Piped remote execution is a high-risk pattern because the script is executed without any integrity checks or inspection, which can lead to arbitrary code execution.
  • [REMOTE_CODE_EXECUTION] (CRITICAL): Detected use of curl | bash to execute code from https://deb.nodesource.com/setup_lts.x. This pattern bypasses safety controls and allows an external source to run scripts directly on the host machine.
  • [COMMAND_EXECUTION] (HIGH): The skill environment allows for direct shell command execution through installation scripts, which increases the potential for unauthorized system modification and privilege escalation.
Recommendations
  • CRITICAL: Downloads and executes remote code from untrusted source(s): https://sh.rustup.rs, https://deb.nodesource.com/setup_lts.x - DO NOT USE
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:03 PM