drugbank-database
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- Dynamic Execution (MEDIUM): The file
references/data-access.mdprovides an example of usingpickle.load()to retrieve cached database results. Thepicklemodule is notoriously insecure as it can execute arbitrary code during deserialization if the cache file is tampered with by an attacker.\n- External Downloads (MEDIUM): The skill requires the installation of several Python packages such asdrugbank-downloaderandbioversionsfrom PyPI. These packages are not maintained by the predefined trusted organizations, posing a supply-chain risk if the packages are compromised.\n- Data Exposure (LOW): The documentation inreferences/data-access.mdguides the user to store DrugBank credentials in environment variables and local configuration files (~/.config/drugbank.ini). If the agent has read access to these locations, the credentials can be exposed.\n- Data Exfiltration (LOW): The skill performs network requests togo.drugbank.comto fetch drug data and JSON responses. This domain is not on the trusted whitelist, although the traffic is consistent with the skill's primary stated purpose.\n- Indirect Prompt Injection (LOW): The skill ingests and parses external XML data from DrugBank (e.g., inreferences/data-access.md). This establishes an attack surface where malicious content embedded in the drug database could potentially influence the agent's behavior at runtime.
Audit Metadata