spaps-feedback
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.check_outputto execute SSH and Docker commands for database access. This is the primary function of the tool. Commands are constructed withshlex.quoteto mitigate shell injection risks. - [DATA_EXFILTRATION]: The skill reads data from a production Postgres database. While it uses read-only queries and a fixed set of columns, this represents access to potentially sensitive user feedback. No unauthorized external transmission was detected, but data is exposed to the AI agent.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted user feedback from the database. This data is used by the agent to rank and invoke sibling skills.
- Ingestion points:
spaps_feedback.dbviascripts/fetch_issues.py(specifically thenoteandcomponent_labelfields). - Boundary markers: Absent. The agent is instructed via natural language in
SKILL.mdto confirm matches with the user, but there are no technical delimiters separating the untrusted data. - Capability inventory:
subprocess.check_output(ssh, docker) inscripts/fetch_issues.pyandscripts/match_skills.py, and the ability to trigger sibling skills. - Sanitization: SQL components are regex-validated, and shell arguments are quoted. However, the content of the user notes is not sanitized or escaped before being presented to the agent.
Audit Metadata