active-storage-setup
Pass
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: LOWEXTERNAL_DOWNLOADS
Full Analysis
- Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'jailbreak' phrases) were detected. The language is purely instructional.
- Data Exfiltration: The skill references AWS credentials via
Rails.application.credentials.digin a configuration snippet. This is a standard and secure method for accessing encrypted credentials in Rails; the skill describes its use but does not attempt to exfiltrate any sensitive data. Nocurl,wget, or similar commands are used to send data to external, non-whitelisted domains. - Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, homoglyphs, or URL/hex/HTML encoding were detected within the skill's content.
- Unverifiable Dependencies: The skill instructs the user to run
bundle add image_processingand mentionsgem "active_storage_validations". These commands install Ruby gems from the RubyGems.org registry. While RubyGems.org is a widely used and generally trusted package registry, these are external dependencies. The JavaScript import@rails/activestoragerefers to a component of the Rails framework itself, which is a trusted, internal dependency. The external gem installations are noted as a LOW severity finding due to being standard dependencies from a trusted package ecosystem. - Privilege Escalation: No commands like
sudo,chmod +x,chmod 777, or instructions for service/daemon installation were found. - Persistence Mechanisms: No patterns indicating attempts to establish persistence (e.g., modifying shell profiles, creating cron jobs, or altering SSH authorized_keys) were detected.
- Metadata Poisoning: The skill's metadata (
name,description,allowed-tools) is benign and accurately reflects its stated purpose. No malicious instructions were found embedded in these fields. - Indirect Prompt Injection: The skill itself is instructional and does not process external user-supplied content, thus it is not directly vulnerable to indirect prompt injection. It describes setting up a system that might process user content (file uploads), but this is a risk for the user's application, not the skill itself.
- Time-Delayed / Conditional Attacks: No conditional logic (e.g., date/time checks, usage counters, environment-specific triggers) that could enable time-delayed or conditional malicious behavior was found.
Audit Metadata