db-create
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local PowerShell script (
db-create.ps1) that invokes the 1C:Enterprise platform executable (1cv8.exe). This is used to create new information bases, either file-based or server-based, according to user parameters.- [COMMAND_EXECUTION]: The script includes logic to automatically discover the 1C platform installation on the system by searching the standardC:\Program Files\1cv8\directory, ensuring it uses the latest available version if not explicitly specified.- [PROMPT_INJECTION]: The skill instructions direct the agent to read configuration from a local.v8-project.jsonfile. This represents an indirect prompt injection surface where a malicious project configuration could attempt to influence thev8pathused for execution. - Ingestion points:
.v8-project.jsonis read from the project root. - Boundary markers: None specified for the configuration file content.
- Capability inventory: Execution of PowerShell scripts and the 1C platform executable via the
Bashtool. - Sanitization: The script includes a
Test-Pathcheck to verify that the target executable exists before attempting to run it.
Audit Metadata