ios-swiftui-ui-patterns
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill recommends the use of an external navigation library hosted at
github.com/Dimillian/AppRouterfor managing complex routing states. - [DATA_EXFILTRATION]: The file
references/scroll-reveal.mdcontains hardcoded absolute local file paths (e.g.,/Users/dimillian/Documents/Dev/Pool/...), exposing details about the original author's local directory structure and system username. - [PROMPT_INJECTION]: The skill contains multiple references to a non-existent version of iOS (e.g., "iOS 26"), which may cause an AI agent to hallucinate APIs or generate invalid code that does not correspond to actual platform capabilities.
- [PROMPT_INJECTION]: An indirect prompt injection surface is present in the deep link handling logic.
- Ingestion points: External, untrusted data enters the agent context via the
.onOpenURLmodifier andOpenURLActionlogic described inreferences/deeplinks.md. - Boundary markers: No specific delimiters or instructions are provided to the agent to treat external URL data as untrusted or to ignore any embedded instructions.
- Capability inventory: Ingested URL data influences the application's core navigation state and view presentation through the
RouterPathandRouteenums. - Sanitization: The provided patterns mention a basic
isInternal(url)check but lack explicit sanitization or strict schema validation for dynamic URL parameters.
Audit Metadata