database-query
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- Metadata Poisoning (MEDIUM): The skill's description in SKILL.md deceptively claims to 'Query database safely with parameterized statements.' This is a false safety claim as the implementation uses unsafe practices.
- Command Execution (HIGH): The function
search_usersinquery.pyis critically vulnerable to SQL injection. It constructs queries using f-strings:f"SELECT * FROM {table_name} WHERE name LIKE '%{search_term}%'". This allows an attacker to inject SQL commands through both thetable_nameandsearch_termparameters. - Command Execution (HIGH): The function
get_user_by_idinquery.pyis vulnerable to SQL injection because it interpolates theuser_iddirectly into the query string:f"SELECT * FROM users WHERE id = {user_id}". An attacker can use this to bypass authentication or extract sensitive information.
Recommendations
- AI detected serious security threats
Audit Metadata