coder-rust-error-handling

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOW
Full Analysis
  • [Prompt Injection] (SAFE): No malicious instructions, bypasses, or system prompt extraction attempts were found. The content is strictly limited to Rust development guidelines.
  • [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file path access, or network operations are present. The documentation URL points to a trusted official source.
  • [Obfuscation] (SAFE): The content is clear-text and does not utilize Base64, zero-width characters, or homoglyph-based evasion.
  • [Unverifiable Dependencies & RCE] (SAFE): No package managers (npm, pip, etc.) are used, and no remote scripts are downloaded or executed.
  • [Indirect Prompt Injection] (INFO): While the skill processes coding patterns, it lacks any write, execute, or network capabilities that could be exploited via untrusted input.
  • [Dynamic Execution] (SAFE): The skill does not generate or execute code at runtime; it is a static documentation-style resource.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 11:24 AM