rust-senior-engineer
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): Automated URLite scanner confirmed a blacklisted malicious URL in
main.rs. While the file content was not provided for manual analysis, this detection is confirmed by the automated security scanner. - [CREDENTIALS_UNSAFE] (HIGH): The
assets/github-ci.ymlfile contains hardcoded database credentials (postgres://test:test@localhost:5432/test) within the test and coverage job environments. - [EXTERNAL_DOWNLOADS] (MEDIUM): The project relies on unverified third-party GitHub Actions from non-trusted organizations (
dtolnay,Swatinem,taiki-e,codecov) and performs external package installations fromcrates.io. - [COMMAND_EXECUTION] (LOW): The project performs multiple shell command executions during the CI/CD process for building and testing.
- [PROMPT_INJECTION] (LOW): The code review guidelines establish a surface for processing untrusted code (PR diffs) without sanitization or boundary markers, creating a risk for indirect prompt injection. Evidence: Ingestion:
references/code-review-guide.md; Boundaries: None; Capability:cargoin CI; Sanitization: None.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata