uniappx-project
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOW
Full Analysis
- Obfuscation (INFO): File
references/components/built-in/unicloud-db.mdcontains garbled text characters (Mojibake), likely due to a UTF-8 to Latin-1 encoding error during document conversion. Manual decoding confirms the text describes theunicloud-dbcomponent and contains no hidden malicious commands. - Indirect Prompt Injection (LOW): The skill provides instructions for components that process untrusted data, specifically
web-view(remote URLs),rich-text(HTML), anduni.request(API responses). While this creates a broad attack surface for indirect prompt injection if the agent handles adversarial content, the provided code examples use safe practices (e.g.,JSON.parsefor data handling andencodeURIComponentfor navigation) rather than dangerous ones likeeval(). - Data Exposure (SAFE): Examples in
examples/api/network/andexamples/api/storage/use standard placeholder strings (e.g.,https://api.example.com,Bearer token123) for demonstration purposes. No real credentials or sensitive hardcoded data were found.
Audit Metadata