fetch-meta-from-kb
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/fetch_meta_from_kb.pyaccesses sensitive database credentials through environment variables and local files. Evidence: The_load_dotenv_if_existsfunction searches for and reads.envfiles in the filesystem, and the_get_db_configfunction retrievesKB_DB_PASSWORDfrom the environment. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by retrieving unsanitized text from a database for consumption by an AI agent. Ingestion points: The
journalsdatabase table fieldstitleandabstract. Boundary markers: No delimiters or ignore instructions are used in the output JSON. Capability inventory: The skill performs local file writes. Sanitization: No validation or escaping of the fetched database strings is implemented.
Audit Metadata