golang-security
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill installs the
govulnchecktool fromgolang.org/x/vuln, which is an official security tool maintained by the Go team. - [EXTERNAL_DOWNLOADS]: The skill recommends installing
gosecfromgithub.com/securego/gosec, a widely recognized and trusted open-source security linter for Go. - [PROMPT_INJECTION]: The skill defines an 'Audit mode' that ingests project code for security review, creating a surface for indirect prompt injection (Category 8). Evidence: 1. Ingestion points: Code files accessed via
Read,Glob, andGreptools. 2. Boundary markers: Not explicitly defined for the audited content. 3. Capability inventory: Access toBash(restricted to Go-related commands),Write, andAgenttools. 4. Sanitization: Not present for processed source code. This is an inherent risk of auditing tools and is handled safely here. - [CREDENTIALS_UNSAFE]: References to secrets and keys in the documentation (e.g.,
AKIA...,mysecretkey) are used strictly as examples or placeholders for developer education and do not contain live or sensitive credentials.
Audit Metadata