rust-ffi

Pass

Audited by Gen Agent Trust Hub on Feb 21, 2026

Risk Level: SAFE
Full Analysis
  • Prompt Injection (SAFE): No instructions found that attempt to override agent behavior or safety guidelines.
  • Data Exposure & Exfiltration (SAFE): No sensitive data access or unauthorized network operations detected. File path usage is restricted to standard system library paths and local project directories.
  • Remote Code Execution (SAFE): The skill utilizes standard Rust build-time tools (bindgen, cc crate). While these tools execute during the build process, the usage patterns described are standard and point to local source files.
  • Indirect Prompt Injection (LOW): The skill defines a surface for processing local C headers and configuration files. It includes best practices like allowlisting and blocklisting for bindgen to restrict the scope of generated code. Evidence:
  • Ingestion points: Reads local C headers (wrapper.h) and environment variables (OUT_DIR).
  • Boundary markers: Uses bindgen allowlist/blocklist filters.
  • Capability inventory: build.rs executes code during compilation; cc crate compiles C code.
  • Sanitization: Employs allowlist_function and blocklist_type to limit the exposure of the generated Rust API.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 21, 2026, 11:05 AM