webassembly-component-development
Pass
Audited by Gen Agent Trust Hub on Feb 12, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists solely of a Markdown file providing educational content about WebAssembly component development. It does not contain any scripts, executable code, or direct commands that the AI agent would execute. The document includes code snippets and command-line examples for users to follow, which is a common pattern for instructional skills.
Threat Category Analysis:
- Prompt Injection: No patterns indicative of prompt injection attempts were found in the skill's content or metadata.
- Data Exfiltration: No commands or code snippets attempting to access sensitive file paths (e.g.,
~/.aws/credentials,~/.ssh/id_rsa) or exfiltrate data to untrusted external domains were detected. All mentioned network operations (e.g.,cargo install,git clone) refer to well-known, trusted sources (crates.io,github.com). - Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, homoglyphs, or other encoding methods were found.
- Unverifiable Dependencies: The skill instructs users to install tools like
wasm-toolsandwasmtime-cliviacargo install, and to clone thewasmtimerepository from GitHub. These are standard tools and repositories from trusted sources (crates.ioandgithub.com/bytecodealliance/wasmtime.git). Since these are instructions for the user and not executed by the agent, and the sources are trusted, this is noted as informational. - Privilege Escalation: No commands attempting to escalate privileges (e.g.,
sudo,chmod 777, service installation) were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc, creating cron jobs) were detected. - Metadata Poisoning: The skill's metadata (
name,description,license,tags) is benign and accurately reflects the skill's purpose. - Indirect Prompt Injection: The skill is informational and does not process external user input, so this threat category is not applicable.
- Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were found.
Conclusion: The skill is purely informational and does not pose any security risks. It is categorized as 'NO_CODE' because it does not contain any executable components for the agent.
Audit Metadata