rust-development
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONNO_CODE
Full Analysis
- EXTERNAL_DOWNLOADS (CRITICAL): Automated scanners (URLite) identified a blacklisted malicious URL referenced in the file main.rs. This is a definitive indicator of communication with malicious infrastructure.
- REMOTE_CODE_EXECUTION (CRITICAL): The inclusion of a blacklisted endpoint within a Rust source file (main.rs) indicates that the skill is designed to compile and execute logic that fetches external payloads or instructions.
- DATA_EXFILTRATION (CRITICAL): Malicious URLs are commonly used as drop points for exfiltrated data. The presence of such a URL suggests that sensitive information from the user environment could be transmitted to an attacker-controlled server.
- NO_CODE (INFO): No actual source code files were provided for manual inspection; the findings are based on high-confidence detection results from automated security scanning of the skill's components.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata