rust-ffi
Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFE
Full Analysis
- Prompt Injection (SAFE): No instructions found that attempt to override agent behavior or safety guidelines.
- Data Exposure & Exfiltration (SAFE): No sensitive data access or unauthorized network operations detected. File path usage is restricted to standard system library paths and local project directories.
- Remote Code Execution (SAFE): The skill utilizes standard Rust build-time tools (bindgen, cc crate). While these tools execute during the build process, the usage patterns described are standard and point to local source files.
- Indirect Prompt Injection (LOW): The skill defines a surface for processing local C headers and configuration files. It includes best practices like allowlisting and blocklisting for bindgen to restrict the scope of generated code. Evidence:
- Ingestion points: Reads local C headers (wrapper.h) and environment variables (OUT_DIR).
- Boundary markers: Uses bindgen allowlist/blocklist filters.
- Capability inventory: build.rs executes code during compilation; cc crate compiles C code.
- Sanitization: Employs allowlist_function and blocklist_type to limit the exposure of the generated Rust API.
Audit Metadata