vue-best-practices
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- Prompt Injection (SAFE): No instructions attempting to override agent behavior or bypass safety guidelines were found. The use of terms like 'Rule' or 'Important' is strictly within the context of coding best practices.
- Data Exposure & Exfiltration (SAFE): No hardcoded credentials, sensitive file paths, or exfiltration logic were detected. Code examples use safe placeholders for state management and API calls.
- Obfuscation (SAFE): Content is presented in plain-text Markdown and standard code snippets. No encoded content or hidden characters were found.
- Unverifiable Dependencies & Remote Code Execution (SAFE): The skill does not contain executable scripts or dependency installation commands. Mentions of external packages are for documentation purposes only.
- Privilege Escalation (SAFE): No patterns related to unauthorized permission acquisition were detected.
- Persistence Mechanisms (SAFE): No attempts to maintain access across sessions were identified.
- Metadata Poisoning (SAFE): Frontmatter and documentation titles accurately reflect the technical content of the files.
- Indirect Prompt Injection (SAFE): The skill is a static set of documentation files and does not process untrusted runtime data.
- Time-Delayed / Conditional Attacks (SAFE): No malicious conditional logic or time-gated execution was found.
- Dynamic Execution (SAFE): No unsafe use of dynamic code execution (e.g., eval, exec) or dangerous deserialization was detected.
Audit Metadata