go-errors

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): The content consists entirely of technical documentation and code examples for Go error handling. No instructions were found that attempt to override agent behavior, bypass safety filters, or extract system prompts.
  • [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, secrets, or sensitive file paths were detected. The file system and network examples (e.g., os.Open, http.Error) are standard Go idioms used for educational purposes.
  • [Obfuscation] (SAFE): The file is written in clear text with no signs of Base64 encoding, hidden Unicode characters, or other obfuscation techniques.
  • [Remote Code Execution] (SAFE): There are no commands for downloading or executing remote scripts (e.g., curl | bash). Mentions of external packages like pkg/errors are standard in the Go ecosystem and no installation commands are provided.
  • [Persistence & Privilege Escalation] (SAFE): No code attempts to modify shell profiles, system services, or use elevated commands like sudo.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:47 PM