rds
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): Hardcoded passwords detected in example code blocks.
- Evidence in
SKILL.md:MasterUserPassword='SecurePassword123!'is used in both AWS CLI and boto3 RDS creation examples. - Evidence in
administration.md:--secret-string '{"username":"admin","password":"InitialPassword123!"}'is hardcoded in a Secrets Manager creation example. - [COMMAND_EXECUTION] (LOW): The skill contains numerous commands for modifying cloud infrastructure via the AWS CLI.
- Evidence: Multiple instances of
aws rds create-db-instance,aws ec2 authorize-security-group-ingress, andaws rds modify-db-instance. - Context: These capabilities are essential to the skill's primary purpose of database administration.
Recommendations
- AI detected serious security threats
Audit Metadata