building-tauri-with-github-actions
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): Detected use of
curl | shto execute code fromhttps://sh.rustup.rs. Piped remote execution is a high-risk pattern because the script is executed without any integrity checks or inspection, which can lead to arbitrary code execution. - [REMOTE_CODE_EXECUTION] (CRITICAL): Detected use of
curl | bashto execute code fromhttps://deb.nodesource.com/setup_lts.x. This pattern bypasses safety controls and allows an external source to run scripts directly on the host machine. - [COMMAND_EXECUTION] (HIGH): The skill environment allows for direct shell command execution through installation scripts, which increases the potential for unauthorized system modification and privilege escalation.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://sh.rustup.rs, https://deb.nodesource.com/setup_lts.x - DO NOT USE
- AI detected serious security threats
Audit Metadata