rust-cross
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill instructs users to install external tools
crossandcargo-zigbuildusingcargo install. These are industry-standard tools for the skill's stated purpose of cross-compilation. - [COMMAND_EXECUTION] (SAFE): Standard use of build commands including
cargo build,cross build, andrustup target add. These operations are essential for the primary functionality of binary compilation. - [PROMPT_INJECTION] (LOW): This skill exhibits an indirect prompt injection surface (Category 8) because it interacts with project configuration files that could be manipulated to influence agent behavior during builds.
- Ingestion points:
Cargo.toml,Cross.toml, and.cargo/config.toml. - Boundary markers: Absent in instructions.
- Capability inventory:
cargo build,cross build,rustup, andapt-get(inside Docker context). - Sanitization: Not applied to project configuration content.
- [SECURITY_SCANNER_ALERT] (SAFE): An automated scanner flagged
main.rsfor a blacklisted URL. Manual review of themain.rssnippet inSKILL.mdreveals only standard, safe Rustno_stdboilerplate with no URLs, indicating a likely false positive.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata