sqlite-ops
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- Dynamic Execution (MEDIUM): The skill provides Python patterns that construct SQL queries using string interpolation for column names and JSON field paths. This pattern is vulnerable to SQL injection if the keys or field names originate from untrusted sources. * Evidence in
references/async-patterns.md: Theupdate_itemfunction joins dictionary keys directly into the SQL SET clause:", ".join(f"{k} = ?" for k in updates.keys()). * Evidence inreferences/migration-patterns.md: Thequery_json_fieldandupdate_json_fieldfunctions interpolate the{field}variable directly intojson_extractandjson_setcalls. - Indirect Prompt Injection (LOW): The skill handles untrusted data ingestion (database records) without providing clear boundary markers or sanitization patterns for structural elements (like column names). * Ingestion points: Input parameters in
update_itemandquery_json_field(e.g., dictionary keys and field names). * Boundary markers: Absent in code patterns; there are no instructions to validate or escape structural metadata. * Capability inventory: The skill utilizes 'Read', 'Write', and 'Bash' tools across all scripts to manipulate files and execute database commands. * Sanitization: While query values are parameterized, structural metadata (keys/fields) are interpolated directly without sanitization.
Audit Metadata