flutter-ui-components
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [SAFE]: No malicious patterns, obfuscation, or unauthorized data access were detected. The skill uses standard development workflows for the Flutter framework.
- [COMMAND_EXECUTION]: Employs trusted MCP tools (
mcp__dart__hot_reloadandmcp__dart__dart_format) to manage code formatting and validation during the development cycle. - [INDIRECT_PROMPT_INJECTION]: Identifies a potential surface for indirect injection as the skill processes user-provided UI specifications and external component code fetched through standard interfaces.
- Ingestion points: User requests in
SKILL.mdand component code retrieved viamcp__material3__get_component_codeinM3_REFERENCE.md. - Boundary markers: Absent; the skill does not explicitly use delimiters to separate instructions from fetched data.
- Capability inventory: Ability to generate Dart code and perform hot reloads (
SKILL.md). - Sanitization: Absent; the skill relies on the agent's internal logic to interpret and generate UI code from inputs.
Audit Metadata