tauri-development
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALPROMPT_INJECTION
Full Analysis
- [Prompt Injection] (SAFE): No instructions were found that attempt to override system prompts or bypass AI safety constraints.\n- [Indirect Prompt Injection] (LOW): The skill provides example code for file operations that ingests untrusted strings, creating a potential path traversal surface.\n
- Ingestion points: The
pathandcontentstring arguments in the Rustread_fileandwrite_filecommands.\n - Boundary markers: Absent in code snippets; however, the text provides context for their use.\n
- Capability inventory: Demonstrates capabilities for reading and writing files on the host filesystem using
std::fs.\n - Sanitization: Absent in snippets, though the text explicitly instructs: 'Sanitize file paths and user inputs'.\n- [Data Exposure & Exfiltration] (SAFE): No hardcoded secrets, sensitive file paths, or network exfiltration logic was identified.\n- [Obfuscation] (SAFE): No use of encoding, hidden characters, or homoglyphs was detected.\n- [External Downloads] (SAFE): The mentioned dependencies (Tauri, React, Tailwind) are standard and reputable libraries for the stated development purpose.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata