db-load-cf

Pass

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes powershell.exe to run the db-load-cf.ps1 script and 1cv8.exe (1C Enterprise Designer) to update database configurations.
  • [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface through data ingestion. 1. Ingestion points: Reads project metadata from .v8-project.json and execution results from load_cf_log.txt. 2. Boundary markers: No explicit delimiters or ignore-instructions are used to wrap data ingested from external files. 3. Capability inventory: The skill can execute shell commands via PowerShell and binary operations via the 1C platform. 4. Sanitization: The PowerShell script uses the -ArgumentList array in Start-Process, which safely handles parameters and prevents injection into the underlying shell command.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 4, 2026, 10:35 AM