dhh-rails-style
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION] (SAFE): The instructions are strictly focused on Ruby on Rails coding styles.\n
- No override or bypass markers detected.\n
- No attempts to extract system prompts or change agent roles.\n- [DATA_EXFILTRATION] (SAFE): No patterns for accessing or exfiltrating sensitive data were identified.\n
- File paths mentioned (e.g., app/models/) are standard for Rails development.\n
- No network exfiltration commands found.\n- [REMOTE_CODE_EXECUTION] (SAFE): No dynamic code execution or remote script piping detected.\n
- Examples using eval or exec are absent.\n
- Remote URLs in credits are for documentation purposes only.\n- [COMMAND_EXECUTION] (SAFE): No shell command execution patterns found.\n- [EXTERNAL_DOWNLOADS] (SAFE): The skill lists Ruby gems for informational purposes but does not perform any downloads.\n- [CREDENTIALS_UNSAFE] (SAFE): No hardcoded API keys, tokens, or secrets are present.
Audit Metadata