postgresql
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [PROMPT_INJECTION] (HIGH): Significant risk of indirect prompt injection (Category 8). The skill provides the capability to execute external SQL scripts (
psql -f script.sql) and arbitrary queries (psql -c). If an agent processes SQL provided by an untrusted user, it could lead to unauthorized data access or administrative takeover. - Ingestion points:
psql -f script.sqlandpsql -c "..."inSKILL.md. - Boundary markers: Absent. There are no instructions to validate or delimit SQL content.
- Capability inventory: Full database administrative rights, including
CREATE USER WITH SUPERUSER,DROP DATABASE, andGRANT ALL PRIVILEGES. - Sanitization: Absent. No logic is provided to escape or verify SQL commands before execution.
- [COMMAND_EXECUTION] (HIGH): The skill enables execution of powerful shell commands and database operations that can modify the host system or delete data.
- Evidence:
pg_dumpandpg_restorecommands allow file system interaction;DROP DATABASEandpg_terminate_backendallow service disruption. - [CREDENTIALS_UNSAFE] (MEDIUM): The documentation includes templates for hardcoding passwords in plaintext SQL commands.
- Evidence:
CREATE USER username WITH PASSWORD 'password';andALTER USER username WITH PASSWORD 'newpassword';. While these use placeholder values, they demonstrate and encourage a practice of embedding credentials in commands that may be logged or captured.
Recommendations
- AI detected serious security threats
Audit Metadata