rails-application-ui-blocks

Pass

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION] (SAFE): The skill includes a maintenance script (build_template_catalog.py) and search commands (ripgrep). Technical review of the Python script shows it uses only standard libraries to perform local filesystem tasks: finding HTML files and writing a JSON catalog. There are no subprocess calls or unsafe execution patterns.
  • [DATA_EXFILTRATION] (SAFE): No network operations (e.g., curl, fetch) or access to sensitive file paths (e.g., ~/.ssh, .env) were detected. The skill only interacts with the project's own UI templates.
  • [EXTERNAL_DOWNLOADS] (SAFE): No remote scripts or packages are downloaded. References in the metadata point to trusted documentation sites like tailwindcss.com and hotwired.dev.
  • [PROMPT_INJECTION] (SAFE): The instructions focus strictly on UI composition and refactoring. No bypass markers, role-play injections, or instructions to ignore safety protocols are present.
  • [INDIRECT_PROMPT_INJECTION] (LOW):
  • Ingestion points: The script reads file names and paths within the templates/application-ui directory.
  • Boundary markers: The data is serialized into a structured JSON catalog.
  • Capability inventory: The skill allows reading files and executing a specific local script, but lacks network or arbitrary shell execution capabilities.
  • Sanitization: The script uses standard JSON serialization, preventing data from being interpreted as code during the catalog build process.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 19, 2026, 08:14 PM