skills/databricks-solutions/vibe-coding-workshop-template/prompt-registry-patterns/Gen Agent Trust Hub
prompt-registry-patterns
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
spark.sql()within several files (SKILL.md,scripts/register_prompts.py,references/loading-patterns.md) to manage prompt storage. This is the standard method for interacting with Unity Catalog tables in a Databricks environment and is used for its intended purpose of configuration management. - [PROMPT_INJECTION]: The skill architecture involves loading prompts from external storage at runtime, which is a common pattern for agent configuration.
- Ingestion points: Prompts are retrieved from the
agent_configtable in Unity Catalog. - Boundary markers: Not explicitly enforced in the logic, as the skill assumes governed access to the configuration table.
- Capability inventory: The skill utilizes
spark.sqlfor data retrieval andmlflowfor artifact versioning. - Sanitization: The implementation includes explicit logic to escape single quotes (
.replace("'", "''")) to prevent SQL injection during prompt registration. - [EXTERNAL_DOWNLOADS]: The skill references documentation and GitHub repositories owned by
databricks-solutionsandmlflow. These are trusted organizations, and the references are documented neutrally as legitimate technical dependencies.
Audit Metadata