mjml
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOW
Full Analysis
- [Prompt Injection] (SAFE): No instructions attempting to bypass safety filters or override system prompts were found. The instructions are focused on providing expertise in MJML syntax.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file path access, or unauthorized network operations were detected. URL references are placeholders or standard font providers.
- [Remote Code Execution] (SAFE): The skill does not contain any scripts, package managers, or remote download commands.
- [Obfuscation] (SAFE): No encoded strings, hidden characters, or homoglyphs were detected in the documentation.
- [Indirect Prompt Injection] (SAFE): While the skill assists in processing MJML code, it lacks capabilities (like file writing or command execution) that could be exploited via malicious inputs.
Audit Metadata