dotnet-testing-advanced-testcontainers-database

Pass

Audited by Gen Agent Trust Hub on Mar 7, 2026

Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The skill uses hardcoded passwords to configure local test database containers.
  • Evidence: Strings such as 'testpass' and 'YourStrong@Passw0rd' are found in templates/postgresql-container-fixture.cs and SKILL.md.
  • [COMMAND_EXECUTION]: The provided templates include functionality to load and execute SQL commands from local files.
  • Evidence: The EnsureTablesExist method in templates/dapper-integration-tests.cs and templates/mssql-collection-fixture.cs reads file content using File.ReadAllText and executes it via _connection.Execute(script) or DbContext.Database.ExecuteSqlRaw(script).
  • [PROMPT_INJECTION]: The skill presents an indirect injection surface by ingesting and executing local SQL scripts as database commands.
  • Ingestion points: Reads .sql files from the SqlScripts/ directory (identified in templates/dapper-integration-tests.cs and templates/mssql-collection-fixture.cs).
  • Boundary markers: Absent; file content is read and interpolated directly into execution methods without delimiters or ignore instructions.
  • Capability inventory: Capability to execute database commands via Dapper's Execute and Entity Framework Core's ExecuteSqlRaw methods.
  • Sanitization: No validation or escaping is applied to the script content before it is executed against the database.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 7, 2026, 02:58 PM