managing-tauri-app-resources

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGH
Full Analysis
  • [SAFE] (INFO): The skill consists of pedagogical documentation for managing application resources and state in the Tauri framework. No malicious instructions or hidden payloads were found.
  • [COMMAND_EXECUTION] (LOW): Mentions standard build-time commands such as cargo tauri icon. These are utility commands used by developers and do not constitute a runtime threat to the agent or user.
  • [EXTERNAL_DOWNLOADS] (LOW): References official framework libraries including tauri, serde, and @tauri-apps/api. While these are external dependencies, they are industry-standard and sourced from official registries (crates.io and npm).
  • [DATA_EXFILTRATION] (INFO): Code examples include local filesystem access via std::fs::read_to_string and @tauri-apps/plugin-fs. These operations are scoped to the application's local resource directory as per standard Tauri security configurations and do not involve network exfiltration.
  • [FALSE POSITIVE ANALYSIS] (INFO): An automated scanner flagged 'main.rs' as a malicious URL. Technical review confirms 'main.rs' is a standard Rust source file identifier. The alert is likely a regex false positive where the '.rs' extension was incorrectly interpreted as a Serbian top-level domain.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 08:02 AM