pubchem-database
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill requires
pubchempyandrequests. While these are common libraries, the use of specialized third-party packages from PyPI without version pinning or integrity checks introduces a supply chain risk where a compromised package could execute arbitrary code. - [DATA_EXFILTRATION] (LOW): The scripts
scripts/bioactivity_query.pyandscripts/compound_search.pyperform network requests topubchem.ncbi.nlm.nih.gov. This domain is not on the trusted whitelist. While appropriate for the skill's purpose, all non-whitelisted network activity is flagged for review to ensure no sensitive data is sent to external endpoints. - [PROMPT_INJECTION] (LOW): (Category 8: Indirect Prompt Injection) The skill possesses an attack surface for indirect prompt injection.
- Ingestion points: Data is ingested from the PubChem PUG and PUG-View APIs in
bioactivity_query.pyand via thepubchempylibrary incompound_search.py. - Boundary markers: There are no delimiters or 'ignore embedded instructions' warnings applied to the data retrieved from the API before it is processed by the agent.
- Capability inventory: The skill has network access capabilities (
requests) and file-writing capabilities (pcp.downloadincompound_search.py). - Sanitization: No sanitization or validation of the external API content is performed, meaning malicious strings stored in the PubChem database (e.g., in compound descriptions or synonyms) could potentially influence the agent's behavior.
Audit Metadata