NYC

aws-rds-database

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
  • [CREDENTIALS_UNSAFE] (HIGH): Hardcoded literal passwords found in implementation examples. Evidence: SKILL.md contains '--master-user-password MySecurePassword123!' in an AWS CLI command and 'ALTER ROLE app_user WITH PASSWORD 'MySecurePassword123!';' in a SQL block.
  • [COMMAND_EXECUTION] (LOW): The skill documentation includes executable AWS CLI and PostgreSQL commands for infrastructure and database management. Evidence: Commands such as 'aws rds create-db-instance' and 'psql' are documented for use. This category is downgraded to LOW as it is central to the skill's primary purpose.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 05:09 PM