zig-system-calls
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- Prompt Injection (SAFE): No instructions to override behavior or bypass safety filters were detected.
- Data Exposure & Exfiltration (SAFE): The skill documents file system access but does not include hardcoded credentials or instructions for data exfiltration.
- Obfuscation (SAFE): No Base64, zero-width characters, or other obfuscation techniques were found.
- Unverifiable Dependencies & Remote Code Execution (SAFE): References to bun.sys and uws.Socket are appropriate for the Zig/Bun context; no untrusted packages or remote scripts are executed.
- Privilege Escalation (SAFE): Documentation of chmod and chown operations is provided for technical completeness and is standard for a system call guide.
- Persistence Mechanisms (SAFE): No patterns related to startup scripts, cron jobs, or other persistence mechanisms were found.
- Metadata Poisoning (SAFE): The name and description accurately reflect the content and contain no hidden instructions.
- Indirect Prompt Injection (SAFE): The skill provides static documentation and templates; it does not implement runtime data ingestion that would be susceptible to injection.
- Time-Delayed / Conditional Attacks (SAFE): No logic gating malicious behavior behind time or environmental conditions was found.
- Dynamic Execution (SAFE): No dynamic code generation or runtime compilation of untrusted code was detected.
Audit Metadata