flutter
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Prompt Injection] (SAFE): No instructions designed to override agent behavior or bypass safety guidelines were found.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file path access, or unauthorized data transmission patterns were detected. Examples using networking and headers are standard documentation patterns.
- [Obfuscation] (SAFE): No signs of Base64 encoding, zero-width characters, homoglyphs, or other obfuscation techniques were identified.
- [Unverifiable Dependencies & Remote Code Execution] (SAFE): All referenced packages (such as
http,go_router,provider) are standard and well-known in the Flutter ecosystem. No remote code execution or suspicious download patterns were found. - [Privilege Escalation] (SAFE): No commands for gaining elevated system privileges (like
sudoorchmod) were found. - [Persistence Mechanisms] (SAFE): No attempts to create persistent access through shell profiles, cron jobs, or registry modifications were detected.
- [Metadata Poisoning] (SAFE): Skill metadata (name, description, author) is descriptive and does not contain malicious instructions.
- [Indirect Prompt Injection] (SAFE): The skill is static reference material and does not provide surfaces for ingesting untrusted external data that could influence the agent.
- [Time-Delayed / Conditional Attacks] (SAFE): No logic gating behavior based on time or specific conditions was found.
- [Dynamic Execution] (SAFE): No dynamic code generation, runtime compilation, or unsafe deserialization patterns were detected.
Audit Metadata