django-cloud-sql-postgres
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (LOW): The setup guide in
references/cloud-sql-proxy-setup.mdinstructs users to download binaries from storage.googleapis.com. This is a trusted Google domain, so the severity is downgraded per [TRUST-SCOPE-RULE]. - REMOTE_CODE_EXECUTION (HIGH): The installation process involves downloading a binary and making it executable with
chmod +x. This sequence is a high-risk vector for remote code execution. - COMMAND_EXECUTION (HIGH): The skill provides instructions to use
sudo mvto install the downloaded binary into /usr/local/bin/. Instructions requiringsudofor privilege escalation are a high-severity finding.
Recommendations
- AI detected serious security threats
Audit Metadata