byted-bytehouse-slow-query
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill executes an MCP server directly from a remote GitHub repository using the
uvxtool withinslow_query_analyzer.py. This code originates from the official Volcano Engine (ByteDance) repository and is used to facilitate database communication. - [EXTERNAL_DOWNLOADS]: The skill downloads the necessary database interface components from
github.com/volcengine/mcp-serverat runtime. This is part of the standard installation and execution flow for this vendor's tools. - [COMMAND_EXECUTION]: The script invokes the
uvxcommand-line utility to provision and run the ByteHouse MCP server as a subprocess. - [PROMPT_INJECTION]: The skill processes untrusted SQL query data from database logs, which represents a surface for indirect prompt injection.
- Ingestion points: Data is read from the
system.query_logtable inslow_query_analyzer.pyvia therun_select_querytool. - Boundary markers: No specific boundary markers are used to encapsulate the query text in the output.
- Capability inventory: The skill can execute SQL queries and write JSON files to the local
output/directory. - Sanitization: No sanitization or filtering of the retrieved SQL query text is performed before it is included in the analysis reports.
Audit Metadata