linkers-lto

Pass

Audited by Gen Agent Trust Hub on Feb 21, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): No instructions attempting to override agent behavior or bypass safety filters were found.
  • [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file path access (e.g., ~/.aws/credentials), or unauthorized network operations detected. The use of -rpath is a standard linker flag for runtime library searching.
  • [Obfuscation] (SAFE): No encoded content, hidden characters, or homoglyphs used to mask malicious intent.
  • [Remote Code Execution] (SAFE): No remote script downloads or piped execution commands (e.g., curl | bash) are present. The skill focuses on local compiler toolchains.
  • [Privilege Escalation] (SAFE): No commands for acquiring elevated privileges (e.g., sudo, chmod 777) or modifying system-level configurations were identified.
  • [Persistence] (SAFE): No attempts to maintain access through shell profiles, startup scripts, or scheduled tasks.
  • [Indirect Prompt Injection] (SAFE): The skill does not ingest untrusted external data (such as web pages or PR bodies) in a manner that would allow for injection into the agent's control flow.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 21, 2026, 06:15 PM