sast-cargo-audit
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill executes
cargo auditandcargo geigershell commands. Running these tools on untrusted source code is risky as malicious projects could exploit the tools or use build scripts (build.rs) to execute code during analysis. - EXTERNAL_DOWNLOADS (MEDIUM): The skill requires the installation of external tools (
cargo-audit,cargo-geiger) from the crates.io registry. These are third-party dependencies that are not within the defined trusted source scope. - PROMPT_INJECTION (HIGH): High susceptibility to Indirect Prompt Injection (Category 8). The skill processes external, untrusted content from
Cargo.toml,Cargo.lock, and vulnerability advisories. 1. Ingestion points: Project manifest files and source code. 2. Boundary markers: Absent. 3. Capability inventory: Shell command execution and file writing. 4. Sanitization: None. Malicious metadata in a scanned project could override agent instructions or trigger unintended actions during the report generation phase.
Recommendations
- AI detected serious security threats
Audit Metadata