api-filtering-sorting
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: NoSQL Injection (ReDoS) via unvalidated Regex. In
SKILL.md, theFilterParser.parseValuefunction andQueryBuilder.searchmethod directly interpolate user-provided strings into MongoDB$regexoperators without escaping or sanitization. Attackers can provide malicious regular expressions to cause catastrophic backtracking, leading to a Denial of Service (DoS) of the database and application.\n- [COMMAND_EXECUTION]: Prototype Pollution in nested object parsing. TheFilterParser.setNestedmethod inSKILL.mditeratively assigns properties to an object based on a user-provided path string. This implementation fails to block sensitive keys such as__proto__orconstructor, allowing an attacker to pollute the global object prototype and potentially achieve application-wide manipulation.\n- [COMMAND_EXECUTION]: Insecure Reflection / Attribute Access. InSKILL.md, the PythonFilterSpecification.to_sqlandlist_productsroute usegetattrto dynamically access database model attributes based on user-controlled request parameters. This allows an attacker to filter or sort by internal, sensitive, or hidden fields that should not be exposed through the public API.\n- [PROMPT_INJECTION]: Indirect Prompt Injection Surface. The skill establishes an attack surface by ingesting untrusted data from network request parameters (req.query,req.url,request.args) and using it to drive database queries. While the skill includes a validation helper in Section 6, the core implementation examples bypass these checks, leaving the system vulnerable to input manipulation attacks.
Recommendations
- AI detected serious security threats
Audit Metadata