avue-crud
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- PROMPT_INJECTION (SAFE): No instructions attempting to override agent behavior or bypass safety filters were detected.
- DATA_EXFILTRATION (SAFE): No sensitive file paths, hardcoded credentials, or unauthorized network operations were found. API examples use standard local endpoints like
/api/users. - OBFUSCATION (SAFE): No encoded content, zero-width characters, or homoglyphs were identified.
- REMOTE_CODE_EXECUTION (SAFE): No remote scripts or dynamic code execution patterns were found.
- INDIRECT_PROMPT_INJECTION (SAFE):
- Ingestion points: Data enters the component through the
:dataprop or API responses handled in methods (e.g.,handleLoadinexamples/features/pagination.md). - Boundary markers: Not applicable for this developer-centric template skill.
- Capability inventory: The skill demonstrates network requests via
this.$httpand data exports via$avue.$export.excel. These are standard UI framework operations. - Sanitization: The skill follows standard Vue 2.x patterns which include built-in XSS protection for data binding.
- DYNAMIC_EXECUTION (SAFE): No runtime code generation or unsafe deserialization (e.g., pickle) was detected.
Audit Metadata