coder-rust-error-handling
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOW
Full Analysis
- [Prompt Injection] (SAFE): No malicious instructions, bypasses, or system prompt extraction attempts were found. The content is strictly limited to Rust development guidelines.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file path access, or network operations are present. The documentation URL points to a trusted official source.
- [Obfuscation] (SAFE): The content is clear-text and does not utilize Base64, zero-width characters, or homoglyph-based evasion.
- [Unverifiable Dependencies & RCE] (SAFE): No package managers (npm, pip, etc.) are used, and no remote scripts are downloaded or executed.
- [Indirect Prompt Injection] (INFO): While the skill processes coding patterns, it lacks any write, execute, or network capabilities that could be exploited via untrusted input.
- [Dynamic Execution] (SAFE): The skill does not generate or execute code at runtime; it is a static documentation-style resource.
Audit Metadata