modern-tailwind

Pass

Audited by Gen Agent Trust Hub on Feb 12, 2026

Risk Level: LOWNO_CODE
Full Analysis

The skill 'modern-tailwind' is composed of a main SKILL.md file and several localized description files (description_cn.txt, description_de.txt, etc.). All these files contain only static, informational text related to Tailwind CSS best practices.

  1. Prompt Injection: No patterns indicative of prompt injection attempts (e.g., 'IMPORTANT: Ignore', 'You are now DAN') were found in any of the text content or metadata.
  2. Data Exfiltration: There are no commands or code snippets that attempt to read sensitive files (e.g., ~/.aws/credentials, ~/.ssh/id_rsa) or perform network requests to external domains.
  3. Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, homoglyphs, or URL/hex/HTML encoding were detected in any of the files.
  4. Unverifiable Dependencies: The skill does not declare or attempt to install any external dependencies (e.g., npm install, pip install, git clone). It is a self-contained, text-only skill.
  5. Privilege Escalation: No commands like sudo, chmod, or other privilege-modifying operations are present.
  6. Persistence Mechanisms: There are no attempts to establish persistence, such as modifying shell configuration files (.bashrc), creating cron jobs, or installing system services.
  7. Metadata Poisoning: The skill's name and description in SKILL.md and the localized description files are clean and accurately reflect the skill's purpose without any hidden malicious instructions.
  8. Indirect Prompt Injection: As the skill does not process external user input or interact with external systems, it does not introduce new vectors for indirect prompt injection.
  9. Time-Delayed / Conditional Attacks: No conditional logic based on dates, usage, or environment variables was found that could trigger malicious behavior at a later time.

In summary, the skill is purely descriptive and contains no active components, making it inherently safe.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 12, 2026, 07:21 PM