relay
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
Cargo.lockfile exhibits a poisoned dependency graph characteristic of a supply chain attack. Standard librariesserdeandserde_jsonhave been modified to include non-standard dependencies (serde_coreandzmij) that do not exist in official releases for those versions. - [REMOTE_CODE_EXECUTION]: The project uses suspicious version numbers for well-known crates that do not match current official versions (e.g.,
serdeat 1.0.228,tokioat 1.51.0, andgetrandomat 0.4.2), indicating a dependency substitution attack. - [REMOTE_CODE_EXECUTION]: The addition of the
zmijcrate as a dependency ofserde_jsonis a major red flag, aszmij(meaning 'viper' in Polish) is not a part of the standard Serde ecosystem and its inclusion suggests the insertion of a malicious payload.
Recommendations
- AI detected serious security threats
Audit Metadata