etl-designer
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWSAFE
Full Analysis
- Dynamic Execution (LOW): The example function
extract_incrementaluses Python f-strings to build a SQL query:query = f"... WHERE updated_at > '{last_run_date}'". This is a SQL injection vulnerability pattern. Parameterized queries should be used instead. - Indirect Prompt Injection (LOW): The skill defines a data ingestion point in
extract_incremental(variablelast_run_date) without boundary markers or sanitization, which could be exploited if the input is user-controlled. Capability inventory: database read viapd.read_sql(File: SKILL.md). - Best Practice Violation (INFO): The DAG definition contains a hardcoded email address
alerts@company.comfor failure notifications.
Audit Metadata