db-run
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The PowerShell script
scripts/db-run.ps1accepts a-Passwordparameter and subsequently prints the entire command line, including the password in plain text, to the console via theWrite-Hostcommand. This exposes sensitive credentials in the agent's output and logs. - [COMMAND_EXECUTION]: The skill uses
Start-Processto run the 1C:Enterprise executable with arguments constructed from user input and local configuration files. This dynamic command construction involves unvalidated paths and parameters. - [REMOTE_CODE_EXECUTION]: The
-Executeparameter allows the skill to load and run external 1C processing files (.epf). This capability can be leveraged to execute arbitrary logic within the 1C environment if the file path is pointed to a malicious script. - [EXTERNAL_DOWNLOADS]: The skill's source code references an untrusted GitHub repository (
github.com/Nikolay-Shirokov/cc-1c-skills) in its header, which is not associated with the stated author or any trusted vendor organizations.
Recommendations
- AI detected serious security threats
Audit Metadata