database-integration
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: No patterns of instruction overriding, role-play jailbreaks, or safety bypass attempts were detected.
- [DATA_EXFILTRATION]: No access to sensitive files (e.g., SSH keys, credentials) or unauthorized network transmission logic was found.
- [REMOTE_CODE_EXECUTION]: No remote script execution patterns (like
curl | bash) or dynamic code execution from external sources are present. - [COMMAND_EXECUTION]: The skill references a standard Gradle command (
./gradlew generateJooq) used for build-time code generation within the jOOQ framework. - [EXTERNAL_DOWNLOADS]: The skill references standard, well-known Java libraries (jOOQ, Flyway, PostgreSQL) and a widely-used community Gradle plugin (
nu.studer.jooq). These are standard ecosystem dependencies. - [OBFUSCATION]: No Base64 encoding, zero-width characters, homoglyphs, or other obfuscation techniques were identified.
- [PRIVILEGE_ESCALATION]: No commands for privilege escalation (e.g.,
sudo,chmod 777) are included. - [PERSISTENCE_MECHANISMS]: No attempts to modify shell profiles or system startup configurations were found.
- [INDIRECT_PROMPT_INJECTION]: The skill functions as a static guide and does not ingest untrusted external data for processing, presenting no immediate indirect injection surface.
- [DYNAMIC_EXECUTION]: No usage of unsafe deserialization or runtime code assembly from external inputs was detected.
Audit Metadata