rust-debugging

Fail

Audited by Gen Agent Trust Hub on Feb 21, 2026

Risk Level: CRITICALDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • DATA_EXFILTRATION (CRITICAL): Automated security scans (URLite) identified a blacklisted malicious URL within the main.rs file associated with this skill. This indicates a high risk of the skill being used for data exfiltration or communicating with known malicious infrastructure (C2).
  • EXTERNAL_DOWNLOADS (MEDIUM): The skill instructs users to install tools such as tokio-console, probe-run, and rustfilt using cargo install. These packages are fetched from crates.io but are maintained by organizations not listed in the trusted scope, representing an unverifiable dependency risk.
  • COMMAND_EXECUTION (LOW): The skill provides numerous commands for low-level system debugging, including objcopy, strip, gdb, and lldb. While appropriate for a debugging skill, these tools allow significant control over system memory and executable code and should be used with caution.
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 21, 2026, 11:06 AM