postgre-skill
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill mandates the use of
hostNetwork: truein the generated Kubernetes StatefulSet manifest. This configuration allows the PostgreSQL pod to share the host's network namespace, bypassing network isolation, allowing it to see all traffic on the node, and increasing the risk of node-level attacks. - [CREDENTIALS_UNSAFE]: The Python script
scripts/generate.pygenerates a random password and explicitly includes it as a plain-text comment (# Note: Raw password for reference: {password}) inside the generated Secret manifest. This exposes the credential to anyone with access to the YAML file, logs, or version control, significantly weakening the security of the deployment. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to lack of input validation in the manifest generation process.
- Ingestion points: The
storageandimageparameters passed toscripts/generate.pyvia command-line arguments. - Boundary markers: None present in the Python script or the prompt instructions to delineate user input from the YAML structure.
- Capability inventory: The skill generates resource manifests that are intended to be applied to a Kubernetes cluster, providing a path to infrastructure manipulation.
- Sanitization: There is no sanitization or escaping performed on the
storage_sizeorimagevariables before they are interpolated into the YAML template, allowing for potential manifest injection attacks.
Recommendations
- AI detected serious security threats
Audit Metadata