chdb-sql
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides an interface to execute ClickHouse SQL queries in-process via the
chdblibrary. This is a standard analytical capability for querying datasets in Python environments. - [EXTERNAL_DOWNLOADS]: The SQL engine supports reading data from remote locations using table functions such as
url(),s3(),gcs(), andazureBlobStorage(). These are documented features for analyzing data hosted on cloud providers or web servers. - [DATA_EXFILTRATION]: The skill documents connectors for external databases including MySQL, PostgreSQL, MongoDB, and remote ClickHouse instances. This enables cross-database joins and data transfer as part of normal analytical workflows.
- [REMOTE_CODE_EXECUTION]: The
chdblibrary supports Python User-Defined Functions (UDFs) and AI-assisted SQL generation (chdb.generate_sql). These features involve executing Python logic or dynamically generated SQL, which are functional extensions of the engine. - [PROMPT_INJECTION]: The skill processes external data (CSV, Parquet, JSON, etc.) which constitutes a potential injection surface for untrusted data.
- Ingestion points:
file(),s3(),url(), and various database connectors defined inreferences/table-functions.md. - Boundary markers: None specified for the SQL execution environment.
- Capability inventory: File system access (via
Sessionandfile()) and network operations (via cloud and DB functions). - Sanitization: The documentation explicitly encourages the use of parametrized queries (via the
paramsargument) to prevent SQL injection attacks.
Audit Metadata