alibabacloud-polardb-ai-assistant

Fail

Audited by Gen Agent Trust Hub on Apr 28, 2026

Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill instructions and scripts refer to fetching the official Aliyun CLI installation script and binaries from https://aliyuncli.alicdn.com/install.sh and related Aliyun CDN endpoints. This is standard behavior for establishing the necessary environment for managing Alibaba Cloud services.\n- [COMMAND_EXECUTION]: The skill describes and facilitates the execution of the downloaded installation script via a shell pipe (| bash) and uses sudo for moving the resulting binary to a system path (/usr/local/bin/). These operations are typical for software installation and are directed at official vendor infrastructure.\n- [PROMPT_INJECTION]: The skill takes user-provided natural language input via a query parameter and interpolates it into the aliyun das get-yao-chi-agent command string. This creates an indirect prompt injection surface where the downstream AI agent processes instructions provided by the user.\n
  • Ingestion points: The $QUERY variable in scripts/call_yaochi_agent.sh which is populated by user natural language input.\n
  • Boundary markers: The query is interpolated into the CLI command without surrounding delimiters or explicit instructions for the downstream agent to ignore embedded directives.\n
  • Capability inventory: The skill can perform database diagnostics, analyze performance, and audit security configurations via the DAS plugin.\n
  • Sanitization: The call_yaochi_agent.sh script implements length validation (4000 character limit) for the query and pattern-based validation for other parameters like session IDs and profile names.
Recommendations
  • HIGH: Downloads and executes remote code from: https://aliyuncli.alicdn.com/install.sh - DO NOT USE without thorough review
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 28, 2026, 05:34 AM