PostgreSQL
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill requires the agent to execute a local binary
PgQuery.exelocated atY:/CSharpDLLs/PgQuery/orC:/Users/matthew.heath/Git/PgQueryto perform database operations. - [CREDENTIALS_UNSAFE]: The instructions direct the agent to read connection parameters, including plaintext passwords, from JSON configuration files stored in
R:/JsonParams/. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it executes user-supplied SQL or SQL files via the
PgQuery.exetool without sanitization or boundary markers. Ingestion points: SQL strings and files. Boundary markers: Absent. Capability inventory: Full DDL/DML access to the database. Sanitization: No evidence of parameterization or input filtering.
Recommendations
- AI detected serious security threats
Audit Metadata