rust-profiling

Warn

Audited by Gen Agent Trust Hub on Feb 21, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION] (HIGH): The skill frequently instructs the user to use sudo to execute commands. Specifically, it suggests running sudo cargo flamegraph, which executes the Rust build system and the resulting binary with root privileges.
  • [COMMAND_EXECUTION] (MEDIUM): Instructions include modifying system-wide kernel parameters to enable profiling, such as setting perf_event_paranoid to 1 and kptr_restrict to 0. These actions reduce the security posture of the host kernel.
  • [EXTERNAL_DOWNLOADS] (MEDIUM): The skill installs several third-party tools via cargo install (flamegraph, cargo-bloat, cargo-llvm-lines) and clones an external repository (https://github.com/brendangregg/FlameGraph). While these are standard tools in the Rust ecosystem, they are unverifiable dependencies downloaded at runtime.
  • [COMMAND_EXECUTION] (LOW): The skill uses open and xdg-open to automatically view generated SVG and HTML files in a browser, which could be exploited if the output filenames are manipulated.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 21, 2026, 11:05 AM