db-dump-cf

Warn

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes a PowerShell script (scripts/db-dump-cf.ps1) which further invokes the 1C Enterprise platform executable (1cv8.exe) using Start-Process.
  • [CREDENTIALS_UNSAFE]: The PowerShell script accepts a -Password parameter for database authentication and then prints the entire command line, including the plain-text password, to the standard output using Write-Host. This results in sensitive credentials being exposed in the agent's conversation history and execution logs.
  • [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface by reading and displaying content from external files. 1. Ingestion points: The skill reads .v8-project.json for configuration and dump_cf_log.txt for process results. 2. Boundary markers: No delimiters or protective instructions are used when presenting this content to the agent. 3. Capability inventory: The skill has the capability to execute system commands and read/write local files. 4. Sanitization: There is no validation or escaping of the content read from the JSON or log files before it is processed or displayed.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 5, 2026, 02:56 AM