cass
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): Automated scanners identified a blacklisted URL within the source file
main.rs. In a Rust-based executable context, this pattern is frequently used to fetch and execute secondary malicious payloads or establish connection with a Command and Control (C2) server. - DATA_EXFILTRATION (CRITICAL): The presence of a blacklisted URL in an executable script strongly suggests that the skill is designed to transmit sensitive system or agent data to an untrusted external domain known for malicious activity.
- EXTERNAL_DOWNLOADS (HIGH): The skill references external network resources that have been explicitly flagged as dangerous by security reputation services.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata