css-sass
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- Prompt Injection (SAFE): No malicious override or bypass instructions were detected in the skill metadata or body.
- Data Exposure & Exfiltration (SAFE): No hardcoded credentials, sensitive file paths, or unauthorized network operations were found.
- Obfuscation (SAFE): No encoded strings, zero-width characters, or homoglyphs were identified.
- Unverifiable Dependencies & Remote Code Execution (SAFE): The skill uses standard libraries like
PyYAML(usingsafe_load) and does not download or execute remote scripts. - Privilege Escalation (SAFE): No commands involving
sudo,chmod 777, or administrative privilege acquisition were found. - Persistence Mechanisms (SAFE): No attempts to modify shell profiles, cron jobs, or startup services were detected.
- Metadata Poisoning (SAFE): Metadata fields are descriptive and contain no hidden instructions or deceptive content.
- Indirect Prompt Injection (SAFE): While the skill is designed to process CSS/SCSS data, it lacks the execution capabilities (subprocess, file-write, network) required to facilitate an exploit.
- Time-Delayed / Conditional Attacks (SAFE): No logic gates based on time, date, or environment were found.
- Dynamic Execution (SAFE): The Python validation script uses
yaml.safe_load()for configuration parsing, which is a secure practice. Noeval(),exec(), or dynamic path loading was found.
Audit Metadata