skills/jeremylongshore/claude-code-plugins-plus-skills/validating-database-integrity/Gen Agent Trust Hub
validating-database-integrity
Warn
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The
generate_validation_report.pyscript is vulnerable to indirect prompt injection via a Cross-Site Scripting (XSS) surface. Thegenerate_html_reportfunction constructs an HTML document by directly interpolating potentially untrusted data from a validation results JSON file into the HTML string without any sanitization or escaping. - Ingestion points: Data is ingested from the validation results file (JSON) in
generate_validation_report.py(specifically table names, rule names, and error details). - Boundary markers: Absent. The script does not use delimiters or instructions to ignore embedded code in the processed data.
- Capability inventory: The skill uses
Bash(psql:*)andBash(mysql:*)for database interaction and uses Python's standard library to write reports to the file system. - Sanitization: Absent. There is no evidence of HTML entity encoding or sanitization before data is embedded in the report.
- [COMMAND_EXECUTION]: The
configure_validation_rules.pyscript allows for the definition and storage of arbitrary SQL queries through its 'custom rule' feature. This provides a mechanism for storing potentially malicious SQL commands that could be executed against the database in subsequent validation steps. - Evidence: The
add_custom_rulemethod inconfigure_validation_rules.pytakes a raw SQL query string from user input and saves it directly into the configuration file without validation or safety checks.
Audit Metadata