Turbo & Hotwire Patterns

Pass

Audited by Gen Agent Trust Hub on Feb 12, 2026

Risk Level: LOWNO_CODE
Full Analysis

The skill consists solely of a Markdown file providing instructional content and code examples related to the Hotwire framework. It does not contain any executable scripts, commands, or mechanisms for direct code execution. All code snippets are illustrative and intended for a user to copy and integrate into their own development environment.

  1. Prompt Injection: No patterns indicative of prompt injection attempts were found in the skill's name, description, or content.
  2. Data Exfiltration: The skill does not contain any commands or code that would attempt to read sensitive files or exfiltrate data to external, untrusted domains. JavaScript fetch calls are shown in examples, but they target relative paths (e.g., /search, this.urlValue which is derived from tasks_path), implying internal application endpoints, not arbitrary external servers.
  3. Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected.
  4. Unverifiable Dependencies: The skill references external frameworks and libraries (e.g., @hotwired/stimulus, @stimulus-components/*) and provides links to their official documentation (turbo.hotwired.dev, stimulus.hotwired.dev). These are well-known, trusted sources. Crucially, the skill itself does not execute any commands to install these dependencies; it merely describes their usage. Therefore, there is no direct risk from unverifiable dependencies within the skill's execution context.
  5. Privilege Escalation: No commands or patterns associated with privilege escalation (e.g., sudo, chmod 777, service installation) were found.
  6. Persistence Mechanisms: No attempts to establish persistence (e.g., modifying .bashrc, crontab, authorized_keys) were detected.
  7. Metadata Poisoning: The skill's name and description are benign and accurately reflect its content.
  8. Indirect Prompt Injection: As a documentation-only skill, it does not process external user input, thus it is not susceptible to indirect prompt injection.
  9. Time-Delayed / Conditional Attacks: No conditional logic designed to trigger malicious behavior based on time, usage, or environment was found.

Overall, the skill is a safe, informational resource.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 12, 2026, 10:56 AM