rust-project
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICAL
Full Analysis
- [SAFE] (SAFE): The codebase consists of legitimate Rust templates using established libraries such as Axum for web services and Clap for CLI parsing. No malicious behavior or backdoors were identified.\n- [CREDENTIALS_UNSAFE] (SAFE): Configuration examples in
.env.exampleandconfig.rsuse common development placeholders (e.g., 'password', 'postgres://localhost'). These do not constitute a leak of sensitive production credentials.\n- [COMMAND_EXECUTION] (SAFE): TheMakefileandprocess.rscommands are limited to standard software development tasks (building, linting, testing) and local file processing. All database queries in the services layer utilize SQLx macros which provide compile-time safety against SQL injection.\n- [PROMPT_INJECTION] (SAFE): There are no natural language prompts or LLM-interactive components in this skill that would be susceptible to injection attacks.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata