dotnet-testing-advanced-testcontainers-database

Pass

Audited by Gen Agent Trust Hub on Apr 1, 2026

Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides templates that load SQL scripts from the local file system using File.ReadAllText and execute them directly against a database using ExecuteSqlRaw or Dapper's Execute method in templates/dapper-integration-tests.cs and templates/mssql-collection-fixture.cs.
  • [CREDENTIALS_UNSAFE]: Multiple C# code templates and reference files contain hardcoded passwords (e.g., "Test123456!", "testpass", "YourStrong@Passw0rd") for initializing local Docker test containers for SQL Server and PostgreSQL.
  • [INDIRECT_PROMPT_INJECTION]: The skill implements a pattern for reading and executing external SQL files, creating a vulnerability surface where malicious SQL content could be executed if the source files are compromised.
  • Ingestion points: SQL files in the SqlScripts directory read via File.ReadAllText in templates/dapper-integration-tests.cs and templates/mssql-collection-fixture.cs.
  • Boundary markers: Absent.
  • Capability inventory: Database command execution via ExecuteSqlRaw and Execute in multiple files.
  • Sanitization: Absent; SQL content is read and executed without validation or filtering.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 1, 2026, 12:47 PM