Rails Conventions & Patterns
Pass
Audited by Gen Agent Trust Hub on Feb 12, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill file SKILL.md was thoroughly analyzed. It primarily serves as a detailed reference for Ruby on Rails development, covering various patterns, conventions, and code examples. No malicious patterns were detected across any of the 9 threat categories:
- Prompt Injection: No attempts to override AI behavior or bypass safety guidelines were found in the skill's metadata or content. The use of 'CRITICAL' was in a technical explanation, not an injection attempt.
- Data Exfiltration: There are no commands or code snippets that attempt to access sensitive file paths or perform network operations to exfiltrate data to external, non-whitelisted domains.
- Obfuscation: No forms of obfuscation (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were found in the skill content.
- Unverifiable Dependencies: While the skill mentions
gem 'draper'in its code examples, this is part of illustrative Ruby code and not an instruction for the AI agent to install or execute an external dependency. The skill itself is non-executable documentation. - Privilege Escalation: No commands or instructions for privilege escalation (e.g.,
sudo,chmod 777) were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc, creating cron jobs) were detected. - Metadata Poisoning: The skill's name and description are benign and accurately reflect its purpose.
- Indirect Prompt Injection: As the skill is purely informational and does not process external user input or web content, it does not pose a risk for indirect prompt injection.
- Time-Delayed / Conditional Attacks: No conditional logic designed to trigger malicious behavior based on time, usage, or environment was found.
Given that the skill is entirely descriptive and contains no executable components for the AI agent, it is deemed safe.
Audit Metadata