aws-rds-spring-boot-integration
Pass
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: SAFECREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
SKILL.mdfile provides a shell command example containing a hardcoded password stringYourStrongPassword123!. While intended as a placeholder, providing specific strings for sensitive credentials in documentation can lead to insecure configurations if adopted without modification. - [EXTERNAL_DOWNLOADS]: The file
references/advanced-configuration.mdcontains awgetcommand directed attruststore.pki.rds.amazonaws.comto fetch the Amazon RDS CA certificate bundle. This is a standard requirement for verifying SSL/TLS connections to AWS RDS instances. - [COMMAND_EXECUTION]: The skill documentation describes using the
Bashtool to execute network and database client commands, includingtelnet,curl,mysql, andpsql, to verify connectivity and test application health endpoints. - [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection as it is designed to read and manipulate local project files.
- Ingestion points: The agent uses
Read,Glob, andGreptools to ingest content from local files such aspom.xml,application.properties, and SQL migration scripts. - Boundary markers: None identified; the instructions do not include specific delimiters or warnings to ignore instructions that might be embedded within the processed code or configuration files.
- Capability inventory: The skill allows the use of the
Bashtool for command execution andWrite/Edittools for modifying the local filesystem. - Sanitization: None identified; the skill does not specify procedures for validating or escaping content retrieved from the files before processing it.
Audit Metadata