vue-debug-guides
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- Category 1: Prompt Injection (SAFE): No attempts to override agent behavior, bypass safety filters, or extract system prompts were found. The instructional language is strictly limited to technical guidance for Vue.js development.
- Category 2: Data Exposure & Exfiltration (SAFE): No hardcoded credentials, sensitive file paths (e.g., ~/.aws/credentials), or suspicious network operations were detected. All code examples use standard API placeholders (e.g., /api/user).
- Category 3: Obfuscation (SAFE): No base64 encoding, zero-width characters, homoglyphs, or other obfuscation techniques were identified in the text or code snippets.
- Category 4: Unverifiable Dependencies & Remote Code Execution (SAFE): The files contain standard JavaScript imports (e.g., vue, gsap, lodash-es) used in educational examples. No remote script execution patterns (e.g., curl | bash) or dynamic code generation from untrusted sources were found.
- Category 8: Indirect Prompt Injection (SAFE): Although the skill contains 139 files of technical documentation, the content is consistently educational and defensive. It identifies security and performance risks (e.g., SSR state pollution) and provides correct remediation strategies. No evidence of self-referential malicious instructions was detected.
Audit Metadata