skills/wcygan/dotfiles/tauri/Gen Agent Trust Hub

tauri

Fail

Audited by Gen Agent Trust Hub on Feb 25, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [REMOTE_CODE_EXECUTION]: Automated security scanners identified a malicious URL within the main.rs file. This file serves as the core entry point for the Tauri application, operating with elevated system privileges. A blacklisted URL in this context indicates a risk of unauthorized remote command execution or data exfiltration. \n
  • Evidence: Scanner alert URL:Blacklist|UR09BDF6D942948297-0200 associated with main.rs.\n- [EXTERNAL_DOWNLOADS]: The documentation recommends installing a utility from an unverified GitHub repository (github.com/chippers/msedgedriver-tool) for managing Edge Drivers. Installing and executing code from untrusted third-party sources is a significant supply chain security risk. \n
  • Evidence: cargo install --git https://github.com/chippers/msedgedriver-tool found in references/testing.md.\n- [EXTERNAL_DOWNLOADS]: The skill provides instructions for initializing a project by executing a remote script from the official Tauri domain. This process involves piping remote content directly into a shell. \n
  • Evidence: sh <(curl https://create.tauri.app/sh) in references/getting-started.md.
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 25, 2026, 03:27 AM