m15-anti-pattern
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- Prompt Injection (SAFE): No instructions found that attempt to bypass safety filters or override system prompts. The keywords in the metadata are relevant to the skill's purpose (Rust code review).
- Data Exposure & Exfiltration (SAFE): No hardcoded credentials, sensitive file paths (like ~/.ssh), or network-related commands (curl, wget) were detected. The code snippets provided are pedagogical examples of Rust code.
- Unverifiable Dependencies & Remote Code Execution (SAFE): The skill does not perform any package installations or remote script executions. References to crates like 'toml' or 'tokio' are within the context of Rust coding examples.
- Obfuscation (SAFE): No Base64, zero-width characters, or homoglyphs were found. The use of Chinese characters in the keywords is legitimate for multi-lingual search support.
- Indirect Prompt Injection (SAFE): This skill is a static documentation resource with 'user-invocable: false'. It does not ingest or process untrusted external data.
- Ingestion points: None (static documentation).
- Boundary markers: N/A.
- Capability inventory: No subprocess calls, file-write, or network operations are present in the provided files.
- Sanitization: N/A.
Audit Metadata