julia-development
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [SAFE]: The skill contains legitimate development instructions and best practices for the Julia programming language. There are no signs of malicious patterns, obfuscation, or data exfiltration.
- [COMMAND_EXECUTION]: The skill provides standard shell commands for managing Julia environments (e.g.,
julia --project=.,Pkg.instantiate()), running test suites (Pkg.test()), and building documentation (docs/make.jl). These are routine actions for software development and do not indicate malicious intent. - [INDIRECT_PROMPT_INJECTION]:
- Ingestion points: The skill guides the agent to process and execute code from local project files (e.g.,
test/runtests.jl,docs/make.jl, andProject.toml). - Boundary markers: No explicit delimiters are suggested for handling untrusted input within the provided templates.
- Capability inventory: The skill utilizes the Julia interpreter and system shell to perform package management and code execution tasks.
- Sanitization: The instructions assume a trusted local environment and do not include specific sanitization steps for external data, which is standard for a localized development tool.
Audit Metadata