ios-swiftui-ui-patterns

Pass

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill recommends the use of an external navigation library hosted at github.com/Dimillian/AppRouter for managing complex routing states.
  • [DATA_EXFILTRATION]: The file references/scroll-reveal.md contains hardcoded absolute local file paths (e.g., /Users/dimillian/Documents/Dev/Pool/...), exposing details about the original author's local directory structure and system username.
  • [PROMPT_INJECTION]: The skill contains multiple references to a non-existent version of iOS (e.g., "iOS 26"), which may cause an AI agent to hallucinate APIs or generate invalid code that does not correspond to actual platform capabilities.
  • [PROMPT_INJECTION]: An indirect prompt injection surface is present in the deep link handling logic.
  • Ingestion points: External, untrusted data enters the agent context via the .onOpenURL modifier and OpenURLAction logic described in references/deeplinks.md.
  • Boundary markers: No specific delimiters or instructions are provided to the agent to treat external URL data as untrusted or to ignore any embedded instructions.
  • Capability inventory: Ingested URL data influences the application's core navigation state and view presentation through the RouterPath and Route enums.
  • Sanitization: The provided patterns mention a basic isInternal(url) check but lack explicit sanitization or strict schema validation for dynamic URL parameters.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 21, 2026, 09:42 AM