rs-yew-crate
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [EXTERNAL_DOWNLOADS] (CRITICAL): The automated URLite scanner detected a blacklisted URL within the skill's source code (specifically in
main.rs). This file was not included in the manual review set but is part of the skill's file list. Blacklisted URLs are known to be associated with malware, C2 servers, or malicious external resources. - [DATA_EXFILTRATION] (CRITICAL): The automated URLite scanner detected a phishing URL within
counter.cl. Phishing links are a severe security threat used to capture user credentials or sensitive information through deception. - [SAFE] (SAFE): The provided documentation files (
contexts_and_state.md,html_and_events.md,routing.md, andssr.md) contain standard, legitimate technical guidance for the Yew Rust framework. These files do not exhibit any signs of obfuscation, prompt injection, or malicious command execution.
Recommendations
- AI detected serious security threats
- Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata