m15-anti-pattern

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • Prompt Injection (SAFE): No instructions found that attempt to bypass safety filters or override system prompts. The keywords in the metadata are relevant to the skill's purpose (Rust code review).
  • Data Exposure & Exfiltration (SAFE): No hardcoded credentials, sensitive file paths (like ~/.ssh), or network-related commands (curl, wget) were detected. The code snippets provided are pedagogical examples of Rust code.
  • Unverifiable Dependencies & Remote Code Execution (SAFE): The skill does not perform any package installations or remote script executions. References to crates like 'toml' or 'tokio' are within the context of Rust coding examples.
  • Obfuscation (SAFE): No Base64, zero-width characters, or homoglyphs were found. The use of Chinese characters in the keywords is legitimate for multi-lingual search support.
  • Indirect Prompt Injection (SAFE): This skill is a static documentation resource with 'user-invocable: false'. It does not ingest or process untrusted external data.
  • Ingestion points: None (static documentation).
  • Boundary markers: N/A.
  • Capability inventory: No subprocess calls, file-write, or network operations are present in the provided files.
  • Sanitization: N/A.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:30 PM