rust-debugging
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: CRITICALDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- DATA_EXFILTRATION (CRITICAL): Automated security scans (URLite) identified a blacklisted malicious URL within the
main.rsfile associated with this skill. This indicates a high risk of the skill being used for data exfiltration or communicating with known malicious infrastructure (C2). - EXTERNAL_DOWNLOADS (MEDIUM): The skill instructs users to install tools such as
tokio-console,probe-run, andrustfiltusingcargo install. These packages are fetched from crates.io but are maintained by organizations not listed in the trusted scope, representing an unverifiable dependency risk. - COMMAND_EXECUTION (LOW): The skill provides numerous commands for low-level system debugging, including
objcopy,strip,gdb, andlldb. While appropriate for a debugging skill, these tools allow significant control over system memory and executable code and should be used with caution.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata