Turbo & Hotwire Patterns
Pass
Audited by Gen Agent Trust Hub on Feb 12, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists solely of a Markdown file providing instructional content and code examples related to the Hotwire framework. It does not contain any executable scripts, commands, or mechanisms for direct code execution. All code snippets are illustrative and intended for a user to copy and integrate into their own development environment.
- Prompt Injection: No patterns indicative of prompt injection attempts were found in the skill's name, description, or content.
- Data Exfiltration: The skill does not contain any commands or code that would attempt to read sensitive files or exfiltrate data to external, untrusted domains. JavaScript
fetchcalls are shown in examples, but they target relative paths (e.g.,/search,this.urlValuewhich is derived fromtasks_path), implying internal application endpoints, not arbitrary external servers. - Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected.
- Unverifiable Dependencies: The skill references external frameworks and libraries (e.g.,
@hotwired/stimulus,@stimulus-components/*) and provides links to their official documentation (turbo.hotwired.dev,stimulus.hotwired.dev). These are well-known, trusted sources. Crucially, the skill itself does not execute any commands to install these dependencies; it merely describes their usage. Therefore, there is no direct risk from unverifiable dependencies within the skill's execution context. - Privilege Escalation: No commands or patterns associated with privilege escalation (e.g.,
sudo,chmod 777, service installation) were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc,crontab,authorized_keys) were detected. - Metadata Poisoning: The skill's name and description are benign and accurately reflect its content.
- Indirect Prompt Injection: As a documentation-only skill, it does not process external user input, thus it is not susceptible to indirect prompt injection.
- Time-Delayed / Conditional Attacks: No conditional logic designed to trigger malicious behavior based on time, usage, or environment was found.
Overall, the skill is a safe, informational resource.
Audit Metadata