Skip to content
← Registry
Trust Report

elysiajs-expert

Expert guidance for ElysiaJS web framework development. Use when building REST APIs, GraphQL services, or WebSocket applications with Elysia on Bun. Covers routing, lifecycle hooks, TypeBox validation, Eden type-safe clients, authentication with JWT/Bearer, all official plugins (OpenAPI, CORS, JWT, static, cron, GraphQL, tRPC), testing patterns, and production deployment. Assumes bun-expert skill is active for Bun runtime expertise.

92
REJECTED
Format: openclawScanner: v0.5.0Duration: 8msScanned: 1mo ago · Feb 15, 3:50 AMSource →
Embed this badge
AgentVerus REJECTED 92AgentVerus REJECTED 92AgentVerus REJECTED 92
[![AgentVerus](https://agentverus.ai/api/v1/skill/957877e2-9028-4f53-a001-844f22ee3d67/badge)](https://agentverus.ai/skill/957877e2-9028-4f53-a001-844f22ee3d67)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/957877e2-9028-4f53-a001-844f22ee3d67/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"957877e2-9028-4f53-a001-844f22ee3d67","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/957877e2-9028-4f53-a001-844f22ee3d67/trust

Category Scores

100
Permissions
100
Injection
85
Dependencies
100
Behavioral
75
Content
80
Code Safety

Findings (6)

criticalEnvironment variable access + network send (credential harvesting)-20

Code accesses process.env and makes outbound network requests. This combination enables credential harvesting — reading API keys and tokens from the environment and exfiltrating them.

secret: process.env.JWT_SECRET!,

Review the code for legitimate use. If this is instructional, consider adding a safety disclaimer.

code-safetyASST-05
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

https://app.example.com

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

http://localhost/hello

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

http://localhost/user

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowNo explicit safety boundaries-10

The skill does not include explicit safety boundaries defining what it should NOT do.

No safety boundary patterns found

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
infoError handling instructions present

The skill includes error handling instructions for graceful failure.

Error handling patterns detected

Keep these error handling instructions.

contentASST-09