libafl
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): Detected a piped remote execution pattern. This pattern fetches a script from the internet and immediately executes it. Evidence:
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh. Whilesh.rustup.rsis the official Rust installation endpoint, it is not within the defined list of trusted sources, and the execution method remains a high-risk security anti-pattern. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill initiates a connection to an external domain (
sh.rustup.rs) to download executable content. - [COMMAND_EXECUTION] (MEDIUM): The skill uses the shell to execute an installation script, which can potentially modify system-level configurations.
Recommendations
- HIGH: Downloads and executes remote code from: https://sh.rustup.rs - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata