faion-backend-systems

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICALCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • EXTERNAL_DOWNLOADS (CRITICAL): Automated scanning by URLite detected a malicious URL within the 'main.rs' file. This indicates a high risk of the agent fetching remote content from confirmed malicious or blacklisted sources.
  • CREDENTIALS_UNSAFE (HIGH): Static analysis identified hardcoded secrets and credential placeholders in documentation and templates. Notable examples include a hardcoded JWT secret ('secret') in 'go-http-handlers/README.md' and hardcoded database connection strings ('postgresql://user:pass@localhost/db') in 'sql-optimization/README.md'.
  • COMMAND_EXECUTION (MEDIUM): The 'SKILL.md' configuration includes the 'Bash' tool in its 'allowed-tools' list. This provides an extensive attack surface for arbitrary command execution on the host system if the agent is manipulated.
  • PROMPT_INJECTION (LOW): The skill exhibits a significant indirect prompt injection surface.
  • Ingestion points: The skill uses 'Read', 'Glob', and 'Grep' to ingest untrusted local source code into the agent's context.
  • Boundary markers: There are no explicit boundary markers or instructions to disregard embedded commands in the data being processed.
  • Capability inventory: The agent has high-privilege capabilities including 'Bash', 'Write', and 'Edit'.
  • Sanitization: There is no evidence of sanitization or validation for ingested data before it is processed by the LLM or used in subsequent tool calls.
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 06:29 PM