fastapi-development

Pass

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The file references/security-and-jwt-authentication.md contains a hardcoded fallback value for SECRET_KEY ('dev-secret-key'). While labeled for development, hardcoded secrets in authentication logic are a security risk if inadvertently used in production environments.\n- [COMMAND_EXECUTION]: The skill includes a shell script scripts/validate-api.sh which accepts external input via command-line arguments. While currently limited to echoing the input, such scripts represent a potential path for command injection if the logic is expanded without strict sanitization.\n- [DATA_EXFILTRATION]: FastAPI setup examples in references/fastapi-application-setup.md configure the server to listen on 0.0.0.0. This binds the application to all network interfaces, which can lead to unintended exposure of the service to external networks.\n- [PROMPT_INJECTION]: Indirect prompt injection surface identified through API data processing.\n
  • Ingestion points: User-provided registration and login data (email, password, etc.) in references/api-routes-with-async-endpoints.md.\n
  • Boundary markers: None present to differentiate between user-controlled data and system-level instructions.\n
  • Capability inventory: The skill implements database writes (SQLAlchemy) and security token generation (JWT).\n
  • Sanitization: Pydantic models provide basic type validation and length constraints, but do not specifically filter for prompt injection patterns.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 5, 2026, 01:51 AM