seo-optimizer
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
audit.pyexecutes system-level commands usingsubprocess.run. It specifically invokesdocker execto perform database queries andcurlto fetch data from the WordPress REST API. - [CREDENTIALS_UNSAFE]: The script
audit.pycontains hardcoded database credentials (DB_USER="wordpress",DB_PASS="wordpress") used to access the WordPress database container. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection and data-driven attacks through the processing of untrusted external data.
- Ingestion points: Data is fetched from potentially untrusted WordPress REST API endpoints in
audit.py(functionsget_all_pagesandget_all_posts). - Boundary markers: No delimiters or instructions are used to separate untrusted API data from the agent's logic.
- Capability inventory: The skill possesses the ability to execute shell commands (docker, curl) and perform raw SQL queries.
- Sanitization: The script lacks sanitization for fields like
post_idbefore they are interpolated into SQL strings inget_yoast_metaandget_media_info, creating a SQL injection surface if the API response is compromised.
Audit Metadata