security-audit
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is designed to ingest and analyze untrusted external Rust/Wasm source code.
- Ingestion points: Processes external application code and dependency trees.
- Boundary markers: Absent in the instruction set.
- Capability inventory: Recommends running
cargo clippy,cargo geiger, andcargo fuzzon target projects. These tools trigger the execution of project-definedbuild.rsscripts and procedural macros during compilation or analysis. - Sanitization: None specified.
- Risk: An attacker-controlled project can achieve Remote Code Execution (RCE) by including malicious logic in
build.rs, which the agent would execute when following the skill's auditing instructions.
Recommendations
- AI detected serious security threats
Audit Metadata