systems-programming-rust-project

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICAL
Full Analysis
  • COMMAND_EXECUTION (SAFE): Employs 'cargo new' for project initialization, which is standard practice and safe within this context.
  • EXTERNAL_DOWNLOADS (SAFE): References highly reputable and standard Rust crates such as 'tokio', 'axum', and 'serde' in generated Cargo.toml files.
  • DATA_EXFILTRATION (SAFE): No evidence of unauthorized data transmission or sensitive file access. The flagged 'main.rs' is a local file identifier, not a network destination.
  • INDIRECT_PROMPT_INJECTION (LOW): The skill provides an ingestion surface for user-defined requirements. * Evidence Chain: 1. Ingestion point: User requirements via $ARGUMENTS. 2. Boundary markers: Absent. 3. Capability inventory: Local file system writes and cargo subprocess calls. 4. Sanitization: Absent. Severity remains low as the skill outputs static templates based on the input.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 06:09 PM