rust-cross

Fail

Audited by Socket on Feb 21, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Natural language instruction to download and install from URL detected Benign documentation with standard supply-chain considerations. Best practice recommendations include: pin tool versions, verify container image digests, prefer official/maintained registries, audit Cross.toml and .cargo/config.toml for unintended linker/runner configurations, and maintain a minimal, auditable cross-toolchain footprint. Overall, a low-to-moderate security risk primarily due to dependency on external container images and third-party tooling, not due to embedded malicious content. LLM verification: The provided skill is a practical, well-aligned guide for Rust cross-compilation with expected references to cross and cargo-zigbuild workflows. I found no direct malicious code or indicators of active exfiltration/backdoor behavior in the artifact. However, multiple supply-chain risk patterns exist: unpinned cargo installs, unverified external downloads (Zig), Docker image tags pinned to mutable names (e.g., 'main'), and apt-get in pre-build steps. These increase the chance that an upstream com

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 21, 2026, 11:07 AM
Package URL
pkg:socket/skills-sh/mohitmishra786%2Flow-level-dev-skills%2Frust-cross%2F@c4ce5e3be1b59b1019ecd95890d513b67c8e3dbc