go-chi-handler

Pass

Audited by Gen Agent Trust Hub on Mar 6, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADS
Full Analysis
  • [SAFE]: No malicious code, obfuscation, or prompt injection patterns were detected. The skill focuses on standard software engineering practices for Go backend development.- [EXTERNAL_DOWNLOADS]: The skill references Go modules from the author's own GitHub repository (github.com/cristiano-pacheco/bricks) and well-known libraries like github.com/go-chi/chi/v5. These are standard dependencies for the described architecture and originate from trusted vendor sources.- [INDIRECT_PROMPT_INJECTION]: The skill generates code that handles untrusted data from HTTP requests. 1. Ingestion points: Data enters via request.ReadJSON and chi.URLParam in internal/modules/<module>/http/chi/handler/<resource>_handler.go. 2. Boundary markers: Absent; inputs are mapped directly to use case inputs without explicit delimiters. 3. Capability inventory: The handler performs no sensitive operations like command execution or direct file system access; it delegates to internal use cases. 4. Sanitization: Path parameters are validated using strconv.ParseUint, though string body content mapping depends on downstream use case logic.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 6, 2026, 12:03 PM