db-dump-cf
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a PowerShell script (
scripts/db-dump-cf.ps1) which further invokes the 1C Enterprise platform executable (1cv8.exe) usingStart-Process. - [CREDENTIALS_UNSAFE]: The PowerShell script accepts a
-Passwordparameter for database authentication and then prints the entire command line, including the plain-text password, to the standard output usingWrite-Host. This results in sensitive credentials being exposed in the agent's conversation history and execution logs. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface by reading and displaying content from external files. 1. Ingestion points: The skill reads
.v8-project.jsonfor configuration anddump_cf_log.txtfor process results. 2. Boundary markers: No delimiters or protective instructions are used when presenting this content to the agent. 3. Capability inventory: The skill has the capability to execute system commands and read/write local files. 4. Sanitization: There is no validation or escaping of the content read from the JSON or log files before it is processed or displayed.
Audit Metadata