rs-yew-crate

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICALEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
  • [EXTERNAL_DOWNLOADS] (CRITICAL): The automated URLite scanner detected a blacklisted URL within the skill's source code (specifically in main.rs). This file was not included in the manual review set but is part of the skill's file list. Blacklisted URLs are known to be associated with malware, C2 servers, or malicious external resources.
  • [DATA_EXFILTRATION] (CRITICAL): The automated URLite scanner detected a phishing URL within counter.cl. Phishing links are a severe security threat used to capture user credentials or sensitive information through deception.
  • [SAFE] (SAFE): The provided documentation files (contexts_and_state.md, html_and_events.md, routing.md, and ssr.md) contain standard, legitimate technical guidance for the Yew Rust framework. These files do not exhibit any signs of obfuscation, prompt injection, or malicious command execution.
Recommendations
  • AI detected serious security threats
  • Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 06:52 PM