jgi-lakehouse
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill's documentation and scripts encourage unsafe credential management practices.
README.mdanddocs/authentication.mdinstruct users to store Personal Access Tokens (PAT) in a plain text file (~/.secrets/dremio_pat) and export them directly in the shell profile (~/.bashrc).scripts/get_dremio_token.shallows users to pass their username and password as command-line arguments (./get_dremio_token.sh username password), which results in sensitive credentials being stored in the shell's command history.- [COMMAND_EXECUTION]: Multiple scripts are vulnerable to command or query injection and use insecure execution methods.
examples/find_16s_rrna_genes.pyconstructs SQL queries using f-strings with user-provided taxonomic patterns (e.g.,family_name = '{family_name}'), creating a SQL injection vulnerability if the input is not sanitized.scripts/explore_gold_database.shandscripts/get_dremio_token.shexecute system commands and shell out to Python for JSON parsing using untrusted API responses.scripts/rest_client.pyandscripts/download_img_genomes.pydisable SSL verification (verify=Falsein Python and--insecurein bash), exposing the connection to Man-in-the-Middle (MITM) attacks.- [EXTERNAL_DOWNLOADS]: The skill connects to and downloads data from external JGI endpoints.
- Scripts connect to
http://lakehouse-1.jgi.lbl.gov:9047andhttps://lakehouse.jgi.lbl.govfor database operations. scripts/download_img_genomes.pyaccesses and copies files from the JGI filesystem (e.g.,/clusterfs/jgi/img_merfs-ro/) to the local environment.
Recommendations
- AI detected serious security threats
Audit Metadata