NYC

cass

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • REMOTE_CODE_EXECUTION (CRITICAL): Automated scanners identified a blacklisted URL within the source file main.rs. In a Rust-based executable context, this pattern is frequently used to fetch and execute secondary malicious payloads or establish connection with a Command and Control (C2) server.
  • DATA_EXFILTRATION (CRITICAL): The presence of a blacklisted URL in an executable script strongly suggests that the skill is designed to transmit sensitive system or agent data to an untrusted external domain known for malicious activity.
  • EXTERNAL_DOWNLOADS (HIGH): The skill references external network resources that have been explicitly flagged as dangerous by security reputation services.
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 10:42 PM