db-create

Pass

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes a local PowerShell script (db-create.ps1) that invokes the 1C:Enterprise platform executable (1cv8.exe). This is used to create new information bases, either file-based or server-based, according to user parameters.- [COMMAND_EXECUTION]: The script includes logic to automatically discover the 1C platform installation on the system by searching the standard C:\Program Files\1cv8\ directory, ensuring it uses the latest available version if not explicitly specified.- [PROMPT_INJECTION]: The skill instructions direct the agent to read configuration from a local .v8-project.json file. This represents an indirect prompt injection surface where a malicious project configuration could attempt to influence the v8path used for execution.
  • Ingestion points: .v8-project.json is read from the project root.
  • Boundary markers: None specified for the configuration file content.
  • Capability inventory: Execution of PowerShell scripts and the 1C platform executable via the Bash tool.
  • Sanitization: The script includes a Test-Path check to verify that the target executable exists before attempting to run it.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 4, 2026, 10:54 AM