support-analytics
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The
SKILL.mdfile explicitly directs the agent to execute system commands:sqlite3 data/tickets.db "SELECT ...". This capability can be exploited to execute arbitrary shell commands if the agent is tricked into using SQLite meta-commands like.shellor if shell metacharacters are included in the query string. - [REMOTE_CODE_EXECUTION] (HIGH): The instructions tell the agent to "construct a simple SELECT" query for cases where pre-built queries are insufficient. There is no requirement for input validation or parameterization, creating a direct vulnerability to SQL injection that could lead to unauthorized data access or system compromise.
- [INDIRECT_PROMPT_INJECTION] (HIGH): The skill presents a significant attack surface due to the combination of data ingestion and high-privilege capabilities. Evidence Chain: 1. Ingestion points: The agent reads from
data/tickets.db(defined inSKILL.md). 2. Boundary markers: No markers are used to separate data from instructions. 3. Capability inventory: The agent has shell execution access viasqlite3(defined inSKILL.md). 4. Sanitization: No sanitization or escaping of database content or user input is mentioned.
Recommendations
- AI detected serious security threats
Audit Metadata