tauri-solidjs
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The Rust backend uses std::process::Command to execute a local binary named 'opencode'. While the implementation uses the secure .args() method to prevent shell injection, the reliance on a non-standard external tool increases the risk surface.
- [EXTERNAL_DOWNLOADS] (LOW): An automated scanner detected a blacklisted URL associated with the 'main.rs' file referenced in the project structure. Although the file's content is not provided for verification, the presence of a security alert on a core component is a notable risk factor.
- [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection via the 'prompt' parameter in the 'spawn_opencode' command. Evidence Chain: 1. Ingestion point: 'prompt' argument in spawn_opencode function (lib.rs). 2. Boundary markers: Absent. 3. Capability inventory: Subprocess execution via std::process::Command. 4. Sanitization: Absent.
- [DATA_EXFILTRATION] (SAFE): The 'get_opencode_db_path' function returns the path to a local database in the user's home directory (~/.opencode/opencode.db). Exposing this path is a functional requirement for the application's local state management and does not constitute unauthorized exfiltration.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata