rails-hotwire

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOW
Full Analysis
  • No Malicious Patterns Detected (SAFE): A thorough review of all 57 files reveals no evidence of prompt injection, data exfiltration, or unauthorized command execution. The content is strictly educational and instructional for Ruby on Rails development.
  • Security-Positive Guidance (INFO): The skill includes specific rules (bcast-scope-streams.md, bcast-signed-stream-names.md) that explicitly teach the AI and developer how to prevent data leaks and forgeable channel subscriptions in multi-tenant applications.
  • Safe Architectural Patterns (SAFE): The code examples provided follow the official Hotwire and Rails conventions. No suspicious use of eval, exec, or other dynamic execution vulnerabilities was found in the provided patterns.
  • No Obfuscation (SAFE): The content is entirely plain-text markdown and clear code snippets. No Base64, zero-width characters, or homoglyph-based evasion techniques were detected.
  • Dependency and Resource Integrity (SAFE): External links and package references (such as those to jspm.io in the import map section) are standard for the Rails ecosystem and do not point to known malicious sources.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 04:04 AM