phx-setup-pg
Fail
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/audit_db.exsreads local environment files (e.g.,.env) and prints the raw values of sensitive variables likePOSTGRES_PASSWORDto the standard output during the audit report generation.- [EXTERNAL_DOWNLOADS]: Thescripts/audit_db.exsscript utilizesMix.installto fetch and compile external dependenciesjasonandyaml_elixirfrom the Hex package registry at runtime.- [COMMAND_EXECUTION]: The skill requires the execution of multiple system commands, includingelixirfor running the audit script,docker composefor managing containers, andmixfor Phoenix database tasks.- [DATA_EXFILTRATION]: By printing raw passwords to the terminal, the skill exposes sensitive credentials to the agent's output stream, making them accessible in session logs or to the AI agent itself.- [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection. Ingestion points: Readsconfig/dev.exs,docker-compose.yml, and.envfiles viascripts/audit_db.exs. Boundary markers: Absent. Capability inventory: Includes filesystem access, subprocess execution (elixir,docker), and the ability to modify project configuration files. Sanitization: Relies on regular expressions and YAML parsing for data extraction, which may be susceptible to malicious input if the configuration files are from an untrusted source.
Recommendations
- AI detected serious security threats
Audit Metadata