etl-designer

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOWSAFE
Full Analysis
  • Dynamic Execution (LOW): The example function extract_incremental uses Python f-strings to build a SQL query: query = f"... WHERE updated_at > '{last_run_date}'". This is a SQL injection vulnerability pattern. Parameterized queries should be used instead.
  • Indirect Prompt Injection (LOW): The skill defines a data ingestion point in extract_incremental (variable last_run_date) without boundary markers or sanitization, which could be exploited if the input is user-controlled. Capability inventory: database read via pd.read_sql (File: SKILL.md).
  • Best Practice Violation (INFO): The DAG definition contains a hardcoded email address alerts@company.com for failure notifications.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 07:11 AM