django-cloud-sql-postgres

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • EXTERNAL_DOWNLOADS (LOW): The setup guide in references/cloud-sql-proxy-setup.md instructs users to download binaries from storage.googleapis.com. This is a trusted Google domain, so the severity is downgraded per [TRUST-SCOPE-RULE].
  • REMOTE_CODE_EXECUTION (HIGH): The installation process involves downloading a binary and making it executable with chmod +x. This sequence is a high-risk vector for remote code execution.
  • COMMAND_EXECUTION (HIGH): The skill provides instructions to use sudo mv to install the downloaded binary into /usr/local/bin/. Instructions requiring sudo for privilege escalation are a high-severity finding.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 08:42 PM