exasol-bucketfs
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: In the 'Typical Use Cases' section, the skill provides a Python UDF example that uses
pickle.load()to deserialize a model file retrieved from BucketFS. Thepicklelibrary is notoriously insecure, as it can be exploited to execute arbitrary code if the input file is malicious. - [CREDENTIALS_UNSAFE]: The skill documents the structure of the
~/.exapump/config.tomlfile, which is used to store sensitive connection details such aspassword,bfs_write_password, andbfs_read_passwordin plain text. Storing secrets unencrypted on the file system increases the risk of credential theft if the local environment is compromised. - [COMMAND_EXECUTION]: The skill facilitates the management of the BucketFS file system through the
exapumpCLI tool. This involves executing system commands for operations like listing, copying, and deleting files, which represents an interaction with the underlying shell environment using the vendor-provided utility.
Audit Metadata