debugging-orm-queries

Warn

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • [Indirect Prompt Injection] (HIGH): The skill processes untrusted database logs and EXPLAIN output, which is a significant injection surface. Ingestion points: queries.log and database EXPLAIN plans as described in SKILL.md and evals/evaluations.json. Boundary markers: Absent. Capability inventory: File writing (fs.writeFile in log_interceptor.js) and shell command execution. Sanitization: Absent.
  • [Command Execution] (MEDIUM): Documentation in SKILL.md encourages piping database CLI output (e.g., psql, mysql) directly into Python scripts, which could be exploited if the output contains malicious content.
  • [File Access] (MEDIUM): The log_interceptor.js script includes an exportLogs function that writes query data to an unvalidated filepath provided as an argument, allowing for potential arbitrary file creation or overwriting.
  • [Unverifiable Dependencies] (MEDIUM): SKILL.md references query_analyzer.py and explain_parser.py, but the source code for these scripts is not included in the provided package.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 12:55 PM