database-integration

Pass

Audited by Gen Agent Trust Hub on Feb 28, 2026

Risk Level: SAFE
Full Analysis
  • [PROMPT_INJECTION]: No patterns of instruction overriding, role-play jailbreaks, or safety bypass attempts were detected.
  • [DATA_EXFILTRATION]: No access to sensitive files (e.g., SSH keys, credentials) or unauthorized network transmission logic was found.
  • [REMOTE_CODE_EXECUTION]: No remote script execution patterns (like curl | bash) or dynamic code execution from external sources are present.
  • [COMMAND_EXECUTION]: The skill references a standard Gradle command (./gradlew generateJooq) used for build-time code generation within the jOOQ framework.
  • [EXTERNAL_DOWNLOADS]: The skill references standard, well-known Java libraries (jOOQ, Flyway, PostgreSQL) and a widely-used community Gradle plugin (nu.studer.jooq). These are standard ecosystem dependencies.
  • [OBFUSCATION]: No Base64 encoding, zero-width characters, homoglyphs, or other obfuscation techniques were identified.
  • [PRIVILEGE_ESCALATION]: No commands for privilege escalation (e.g., sudo, chmod 777) are included.
  • [PERSISTENCE_MECHANISMS]: No attempts to modify shell profiles or system startup configurations were found.
  • [INDIRECT_PROMPT_INJECTION]: The skill functions as a static guide and does not ingest untrusted external data for processing, presenting no immediate indirect injection surface.
  • [DYNAMIC_EXECUTION]: No usage of unsafe deserialization or runtime code assembly from external inputs was detected.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 28, 2026, 06:48 AM