skills/i9wa4/dotfiles/dbt/Gen Agent Trust Hub

dbt

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • Data Exposure & Credentials (HIGH): The skill explicitly instructs the agent to read and modify ~/.dbt/profiles.yml in section 3.1. This file is a standard location for sensitive database credentials, including hostnames, usernames, passwords, and access tokens.
  • Evidence: Access to ~/.dbt/profiles.yml is mandated for configuration and connection verification (dbt debug).
  • Indirect Prompt Injection (HIGH): The skill is designed to process external 'Issue work' and execute SQL commands based on those inputs.
  • Ingestion Points: Issue descriptions and numbers used to create targets and modify dbt models.
  • Boundary Markers: None detected in the instructions; external content is directly interpolated into commands.
  • Capability Inventory: High-impact capabilities including dbt run, dbt test, and dbt show --inline, which can execute arbitrary SQL against a database.
  • Sanitization: No sanitization or validation of the SQL strings or issue-based parameters is provided.
  • Command Execution (MEDIUM): The skill relies on the execution of multiple shell commands (dbt, bq, databricks) and encourages the agent to generate and run SQL from target/compiled/ directories, which could be manipulated if an attacker can influence the model files.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 10:37 AM