pocketbase-agent-orchestrator
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell scripts to interact with the PocketBase API and perform system-level operations like backups.\n- Evidence: References to
./skills/pocketbase-operations/scripts/pb_request.sh,pb_healthcheck.sh,pb_api_logs.sh, and the use oftarfor backing up/var/lib/pocketbaseinSKILL.md.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface through the interpolation of user-provided data into shell command execution.\n- Ingestion points: Data entering the context includesRECORD_IDand JSON request bodies used in API calls withinSKILL.md.\n- Boundary markers: Absent. There are no markers or instructions to treat input as literal data rather than command components.\n- Capability inventory: The skill can execute shell scripts and read system directories (SKILL.md).\n- Sanitization: No sanitization or escaping mechanisms are documented for the interpolated variables.
Audit Metadata