pgque-postgres-queue

Pass

Audited by Gen Agent Trust Hub on Apr 19, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill instructs the user to download source code from a third-party GitHub repository (https://github.com/NikolayS/pgque.git) for installation. This is consistent with the skill's primary purpose.
  • [COMMAND_EXECUTION]: Provides instructions for executing shell commands such as git clone and psql to set up the database queue system on a Postgres instance.
  • [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface by processing external data from a queue. 1. Ingestion points: Data is received via pgque.receive() in the Python examples. 2. Boundary markers: No delimiters or instructions to ignore embedded commands are present in the processing logic. 3. Capability inventory: The skill utilizes psycopg2 for database operations and Python for logic execution. 4. Sanitization: While the skill uses JSON parsing, it does not sanitize the contents of the payload against instruction injection.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 19, 2026, 03:13 AM