rust-project

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICAL
Full Analysis
  • [SAFE] (SAFE): The codebase consists of legitimate Rust templates using established libraries such as Axum for web services and Clap for CLI parsing. No malicious behavior or backdoors were identified.\n- [CREDENTIALS_UNSAFE] (SAFE): Configuration examples in .env.example and config.rs use common development placeholders (e.g., 'password', 'postgres://localhost'). These do not constitute a leak of sensitive production credentials.\n- [COMMAND_EXECUTION] (SAFE): The Makefile and process.rs commands are limited to standard software development tasks (building, linting, testing) and local file processing. All database queries in the services layer utilize SQLx macros which provide compile-time safety against SQL injection.\n- [PROMPT_INJECTION] (SAFE): There are no natural language prompts or LLM-interactive components in this skill that would be susceptible to injection attacks.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 06:10 PM