css-sass

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • Prompt Injection (SAFE): No malicious override or bypass instructions were detected in the skill metadata or body.
  • Data Exposure & Exfiltration (SAFE): No hardcoded credentials, sensitive file paths, or unauthorized network operations were found.
  • Obfuscation (SAFE): No encoded strings, zero-width characters, or homoglyphs were identified.
  • Unverifiable Dependencies & Remote Code Execution (SAFE): The skill uses standard libraries like PyYAML (using safe_load) and does not download or execute remote scripts.
  • Privilege Escalation (SAFE): No commands involving sudo, chmod 777, or administrative privilege acquisition were found.
  • Persistence Mechanisms (SAFE): No attempts to modify shell profiles, cron jobs, or startup services were detected.
  • Metadata Poisoning (SAFE): Metadata fields are descriptive and contain no hidden instructions or deceptive content.
  • Indirect Prompt Injection (SAFE): While the skill is designed to process CSS/SCSS data, it lacks the execution capabilities (subprocess, file-write, network) required to facilitate an exploit.
  • Time-Delayed / Conditional Attacks (SAFE): No logic gates based on time, date, or environment were found.
  • Dynamic Execution (SAFE): The Python validation script uses yaml.safe_load() for configuration parsing, which is a secure practice. No eval(), exec(), or dynamic path loading was found.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:11 PM