tauri
Fail
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: Automated security scanners identified a malicious URL within the
main.rsfile. This file serves as the core entry point for the Tauri application, operating with elevated system privileges. A blacklisted URL in this context indicates a risk of unauthorized remote command execution or data exfiltration. \n - Evidence: Scanner alert
URL:Blacklist|UR09BDF6D942948297-0200associated withmain.rs.\n- [EXTERNAL_DOWNLOADS]: The documentation recommends installing a utility from an unverified GitHub repository (github.com/chippers/msedgedriver-tool) for managing Edge Drivers. Installing and executing code from untrusted third-party sources is a significant supply chain security risk. \n - Evidence:
cargo install --git https://github.com/chippers/msedgedriver-toolfound inreferences/testing.md.\n- [EXTERNAL_DOWNLOADS]: The skill provides instructions for initializing a project by executing a remote script from the official Tauri domain. This process involves piping remote content directly into a shell. \n - Evidence:
sh <(curl https://create.tauri.app/sh)inreferences/getting-started.md.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata