zustand-state-management

Pass

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: LOW
Full Analysis
  • [PROMPT_INJECTION] (SAFE): No instructions were found that attempt to override agent safety protocols, reveal system prompts, or bypass restrictions.- [DATA_EXFILTRATION] (SAFE): No sensitive file access, hardcoded credentials, or unauthorized network operations were identified. The persistence examples refer to standard browser-based state management.- [REMOTE_CODE_EXECUTION] (SAFE): No patterns of downloading and executing remote scripts (e.g., curl/wget piped to bash) were found.- [EXTERNAL_DOWNLOADS] (LOW): The skill references the zustand npm package, which is a standard, widely-used library in the React ecosystem.- [OBFUSCATION] (SAFE): No Base64 encoding, zero-width characters, or homoglyphs were detected in the text or code snippets.- [INDIRECT_PROMPT_INJECTION] (SAFE): The skill does not define ingestion points for untrusted external data, presenting no identified attack surface for indirect injection.- [DYNAMIC_EXECUTION] (SAFE): The provided code uses standard TypeScript interfaces and functional patterns; no use of eval(), exec(), or unsafe deserialization was observed.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 15, 2026, 09:54 PM