rds

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
  • [CREDENTIALS_UNSAFE] (HIGH): Hardcoded passwords detected in example code blocks.
  • Evidence in SKILL.md: MasterUserPassword='SecurePassword123!' is used in both AWS CLI and boto3 RDS creation examples.
  • Evidence in administration.md: --secret-string '{"username":"admin","password":"InitialPassword123!"}' is hardcoded in a Secrets Manager creation example.
  • [COMMAND_EXECUTION] (LOW): The skill contains numerous commands for modifying cloud infrastructure via the AWS CLI.
  • Evidence: Multiple instances of aws rds create-db-instance, aws ec2 authorize-security-group-ingress, and aws rds modify-db-instance.
  • Context: These capabilities are essential to the skill's primary purpose of database administration.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 05:50 PM