managing-tauri-app-resources
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGH
Full Analysis
- [SAFE] (INFO): The skill consists of pedagogical documentation for managing application resources and state in the Tauri framework. No malicious instructions or hidden payloads were found.
- [COMMAND_EXECUTION] (LOW): Mentions standard build-time commands such as
cargo tauri icon. These are utility commands used by developers and do not constitute a runtime threat to the agent or user. - [EXTERNAL_DOWNLOADS] (LOW): References official framework libraries including
tauri,serde, and@tauri-apps/api. While these are external dependencies, they are industry-standard and sourced from official registries (crates.io and npm). - [DATA_EXFILTRATION] (INFO): Code examples include local filesystem access via
std::fs::read_to_stringand@tauri-apps/plugin-fs. These operations are scoped to the application's local resource directory as per standard Tauri security configurations and do not involve network exfiltration. - [FALSE POSITIVE ANALYSIS] (INFO): An automated scanner flagged 'main.rs' as a malicious URL. Technical review confirms 'main.rs' is a standard Rust source file identifier. The alert is likely a regex false positive where the '.rs' extension was incorrectly interpreted as a Serbian top-level domain.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata