redash
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- PROMPT_INJECTION (LOW): The skill exhibits an indirect prompt injection surface (Category 8) by design, as it accepts and executes SQL queries that may incorporate untrusted user data.
- Ingestion points: The
--sqlcommand-line argument and template placeholders (e.g.,{user_email},{start_date}) defined inreferences/common-queries.md. - Boundary markers: Absent; there are no delimiters or instructions to prevent the agent from obeying instructions embedded in the data.
- Capability inventory: The script
scripts/query_redash.pyperforms network POST and GET requests tohttps://sql.telemetry.mozilla.organd writes query results to the local filesystem via the--outputparameter. - Sanitization: Absent; the SQL string is passed directly to the Redash API without validation or escaping.
- COMMAND_EXECUTION (LOW): The skill facilitates the execution of SQL commands against a remote BigQuery instance via the Redash API. While the scope is restricted by the API's permissions, it allows for arbitrary data retrieval tasks.
- DATA_EXFILTRATION (LOW): The skill performs network operations to a non-whitelisted domain (
sql.telemetry.mozilla.org). While these are necessary for the skill's primary function, the ability to write result sets to arbitrary local paths using the--outputflag presents a minor risk of data leakage or file overwriting if misdirected.
Audit Metadata