faion-backend-systems
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (CRITICAL): Automated scanning by URLite detected a malicious URL within the 'main.rs' file. This indicates a high risk of the agent fetching remote content from confirmed malicious or blacklisted sources.
- CREDENTIALS_UNSAFE (HIGH): Static analysis identified hardcoded secrets and credential placeholders in documentation and templates. Notable examples include a hardcoded JWT secret ('secret') in 'go-http-handlers/README.md' and hardcoded database connection strings ('postgresql://user:pass@localhost/db') in 'sql-optimization/README.md'.
- COMMAND_EXECUTION (MEDIUM): The 'SKILL.md' configuration includes the 'Bash' tool in its 'allowed-tools' list. This provides an extensive attack surface for arbitrary command execution on the host system if the agent is manipulated.
- PROMPT_INJECTION (LOW): The skill exhibits a significant indirect prompt injection surface.
- Ingestion points: The skill uses 'Read', 'Glob', and 'Grep' to ingest untrusted local source code into the agent's context.
- Boundary markers: There are no explicit boundary markers or instructions to disregard embedded commands in the data being processed.
- Capability inventory: The agent has high-privilege capabilities including 'Bash', 'Write', and 'Edit'.
- Sanitization: There is no evidence of sanitization or validation for ingested data before it is processed by the LLM or used in subsequent tool calls.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata