database-optimizer

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [Privilege Escalation] (HIGH): The skill contains instructions for the agent to execute 'sudo systemctl restart postgresql' and modify root-owned system configuration files in '/etc/postgresql/14/main/'. This provides a path for service disruption and unauthorized system-wide changes.
  • [Indirect Prompt Injection] (HIGH): The skill is highly vulnerable to indirect injection due to its core purpose of processing untrusted external data.
  • Ingestion points: Reads slow query logs, database activity statistics, and execution plans (EXPLAIN ANALYZE output) as seen in REFERENCE.md and SKILL.md.
  • Boundary markers: None. There are no delimiters or instructions to ignore embedded commands in the processed data.
  • Capability inventory: Includes system service management (systemctl), shell command execution (free, cat, df), and destructive database operations (DROP INDEX, REFRESH MATERIALIZED VIEW, ALTER TABLE) in REFERENCE.md and EXAMPLES.md.
  • Sanitization: None. The skill does not implement validation or escaping for the queries or logs it analyzes.
  • [Command Execution] (MEDIUM): The skill utilizes raw shell commands via subprocesses to inspect system resources ('cat /proc/cpuinfo', 'free -h'). While intended for monitoring, these commands increase the attack surface if the agent is manipulated into executing arbitrary binaries.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 10:45 PM