exasol-udfs
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill defines patterns for User Defined Functions (UDFs) that ingest and process database records, which creates an indirect prompt injection surface.\n
- Ingestion points: Database columns are accessed via
ctx.inputandctx.get_dataframe()as documented inSKILL.mdandreferences/udf-python.md.\n - Boundary markers: No explicit boundary markers or "ignore instructions" warnings are provided in the code templates to separate untrusted data from processing logic.\n
- Capability inventory: UDF environments allow for arbitrary code execution (Python, Java, R) and file system access via BucketFS.\n
- Sanitization: Examples demonstrate basic regex-based cleaning (
re.sub), but the skill does not provide comprehensive input validation or sanitization guidelines for external data.\n- [REMOTE_CODE_EXECUTION]: The documentation describes patterns for dynamic execution and package management.\n - Unsafe Deserialization: Examples in
references/udf-python.mdutilizepickle.load()to deserialize machine learning models from BucketFS. This represents a potential arbitrary code execution vector if the model files are sourced from untrusted locations.\n - Custom Containers: The skill provides instructions for building custom Docker containers using
exaslct, which involves the execution of arbitraryRUNcommands and the installation of remote packages as shown inreferences/slc-reference.md.\n- [COMMAND_EXECUTION]: The documentation references theexaslctCLI tool and various shell commands for building, exporting, and deploying script language containers to the Exasol cluster. These operations require appropriate system permissions and involve subprocess execution.\n- [EXTERNAL_DOWNLOADS]: The skill references official vendor repositories on GitHub and standard package registries including PyPI, CRAN, and Conda for acquiring libraries and development tools. These are documented as part of the legitimate vendor ecosystem.
Audit Metadata