golang-gin-architect
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references several well-known and trusted Go libraries and developer tools (e.g., Gin, SQLX, AWS SDK, Prometheus, OpenTelemetry, Redis, RabbitMQ). Instructions for installing these via 'go install' or 'go get' point to official repositories on GitHub and Google. These are standard development operations and do not include any non-standard or untrusted sources.
- [COMMAND_EXECUTION]: Code examples throughout the reference files demonstrate the use of standard library calls (e.g., net/http, os/signal) and common Go CLI tools (e.g., swag init, buf generate). These are presented as part of normal development and build workflows with no signs of arbitrary or malicious command execution.
- [DATA_EXFILTRATION]: The skill explicitly advises against hardcoding secrets and provides patterns for using environment variables and secure configuration management (e.g., using caarlos0/env). No sensitive file access or unauthorized network exfiltration patterns were detected. Examples involving network operations (S3 uploads, Redis, RabbitMQ) are correctly scoped to instructional purposes.
- [PROMPT_INJECTION]: The instructions in SKILL.md and reference files are purely technical and architectural in nature. They do not contain markers or patterns designed to bypass AI safety filters or override system instructions.
- [SAFE]: The skill provides high-quality, idiomatic Go examples for cross-cutting concerns like observability, resilience (circuit breakers, retries), and clean architecture. The code follows the principle of least privilege and security-by-design, such as using parameterized queries to prevent SQL injection.
Audit Metadata