ratatui-tui
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: No malicious patterns, obfuscation, or data exfiltration vectors were detected during the analysis of the skill body or the provided code templates.
- [COMMAND_EXECUTION]: The skill provides instructions for standard local development tasks, such as copying template assets into a new project and executing the application using
cargo run. These actions are intended for use by a developer in a local environment and do not involve unsanitized user input or suspicious shell execution. - [EXTERNAL_DOWNLOADS]: The templates include
Cargo.tomlandCargo.lockfiles that reference dependencies from the official Rust crate registry (crates.io). All referenced packages, such asratatui,tokio, andcrossterm, are well-known, widely used libraries in the Rust ecosystem. - [DATA_EXFILTRATION]: While the
async-patterns.mdreference documentation provides examples of how to perform network requests using thereqwestcrate, this is presented as a code snippet for architectural guidance rather than active code within the skill itself. No sensitive data access or unauthorized network operations were found in the template code. - [SAFE]: The
component-apptemplate implements standard logging and configuration management, reading from and writing to local directories (e.g.,~/.config/component-app/config.tomland~/.local/share/component-app/logs/app.log). These operations utilize the standarddirscrate and follow platform-specific best practices for TUI applications.
Audit Metadata