linkers-lto
Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFE
Full Analysis
- [Prompt Injection] (SAFE): No instructions attempting to override agent behavior or bypass safety filters were found.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file path access (e.g., ~/.aws/credentials), or unauthorized network operations detected. The use of
-rpathis a standard linker flag for runtime library searching. - [Obfuscation] (SAFE): No encoded content, hidden characters, or homoglyphs used to mask malicious intent.
- [Remote Code Execution] (SAFE): No remote script downloads or piped execution commands (e.g., curl | bash) are present. The skill focuses on local compiler toolchains.
- [Privilege Escalation] (SAFE): No commands for acquiring elevated privileges (e.g., sudo, chmod 777) or modifying system-level configurations were identified.
- [Persistence] (SAFE): No attempts to maintain access through shell profiles, startup scripts, or scheduled tasks.
- [Indirect Prompt Injection] (SAFE): The skill does not ingest untrusted external data (such as web pages or PR bodies) in a manner that would allow for injection into the agent's control flow.
Audit Metadata