alembic
Fail
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill includes a hardcoded database connection string in the
alembic.iniconfiguration section (postgresql+asyncpg://verifid_migrations:password@localhost:5432/verifid_kyc) which contains a plaintext password for a migration user. - [COMMAND_EXECUTION]: The skill requires the use of shell commands to install the
alembicpackage and to execute migration tasks such asalembic init,alembic upgrade, andalembic downgrade. These commands interact directly with the operating system and the database. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface through the
alembic revision --autogenerateprocess. This process ingests data from local application models (backend.modules.models) to generate executable database migration scripts. It lacks explicit boundary markers or sanitization, potentially allowing malicious code in the models to influence the generated DDL operations executed by the database agent.
Recommendations
- AI detected serious security threats
Audit Metadata