aws-rds-database
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): Hardcoded literal passwords found in implementation examples. Evidence: SKILL.md contains '--master-user-password MySecurePassword123!' in an AWS CLI command and 'ALTER ROLE app_user WITH PASSWORD 'MySecurePassword123!';' in a SQL block.
- [COMMAND_EXECUTION] (LOW): The skill documentation includes executable AWS CLI and PostgreSQL commands for infrastructure and database management. Evidence: Commands such as 'aws rds create-db-instance' and 'psql' are documented for use. This category is downgraded to LOW as it is central to the skill's primary purpose.
Audit Metadata