swift-ui-best-practices
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOW
Full Analysis
- Prompt Injection (SAFE): The instructions are strictly limited to technical development guidelines. No patterns intended to override agent constraints or bypass safety filters were detected.
- Data Exposure & Exfiltration (SAFE): No hardcoded credentials, sensitive file paths, or unauthorized network operations are present in the documentation.
- Obfuscation (SAFE): All content is in human-readable markdown without any evidence of Base64 encoding, zero-width characters, or homoglyph-based evasion.
- Unverifiable Dependencies & Remote Code Execution (SAFE): The project uses standard local development tools (pnpm, node). No remote scripts are downloaded or executed via shell piping.
- Privilege Escalation (SAFE): The skill does not contain any commands requesting root access, sudo permissions, or system-level configuration changes.
- Persistence Mechanisms (SAFE): No evidence of shell profile modification, cron job creation, or other persistence techniques were found.
- Metadata Poisoning (SAFE): Metadata fields accurately describe the skill's purpose and do not contain hidden instructions.
- Indirect Prompt Injection (SAFE): The skill is a static knowledge base and does not process external untrusted content at runtime, minimizing the risk of indirect injection.
- Time-Delayed / Conditional Attacks (SAFE): No logic was found that triggers specific behaviors based on dates or external conditions.
- Dynamic Execution (SAFE): The code examples are static Swift snippets for educational purposes and do not involve unsafe runtime evaluation.
Audit Metadata