rust-guidelines

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: CRITICALEXTERNAL_DOWNLOADSDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONNO_CODE
Full Analysis
  • EXTERNAL_DOWNLOADS (CRITICAL): Automated scanners detected main.rs as a malicious URL, suggesting the skill attempts to fetch external code components.
  • DATA_EXFILTRATION (CRITICAL): The scanner flagged file.write.su, which is a high-risk domain associated with unauthorized data writing or Command and Control (C2) infrastructure.
  • REMOTE_CODE_EXECUTION (HIGH): The presence of a remote Rust source file (main.rs) and malicious domain alerts indicates an attempt to download and compile/execute untrusted code.
  • NO_CODE (MEDIUM): The skill contains 0 files yet retains malicious metadata, suggesting evasion tactics or a stripped malicious structure.
Recommendations
  • AI detected serious security threats
  • Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 08:46 AM