db-update
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The PowerShell script
scripts/db-update.ps1accepts a-Passwordparameter and explicitly prints it to the standard output using the commandWrite-Host "Running: 1cv8.exe $($arguments -join ' ')". This behavior exposes sensitive credentials in logs and console output. - [COMMAND_EXECUTION]: The skill uses
powershell.exeto execute a local script that subsequently invokes the 1C Enterprise platform executable (1cv8.exe) viaStart-Process. Arguments for this execution are dynamically constructed from user input and the.v8-project.jsonconfiguration file. - [PROMPT_INJECTION]: The skill instructions in
SKILL.mdrequire the agent to parse a local configuration file (.v8-project.json) and use its values (such asv8pathand database connection strings) to construct command-line arguments. If this file is modified by an attacker in a shared repository, it could lead to indirect injection of malicious arguments into the PowerShell script.
Audit Metadata