data-engineering-storage-lakehouse
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill instructs users to install standard Python packages (
deltalake,pyiceberg,pyspark,delta-spark) via pip indelta-lake.mdandiceberg.md. These are well-established libraries from trusted repositories. - [REMOTE_CODE_EXECUTION] (LOW): In
hudi.md, a command is provided to launchpysparkwith the--packagesflag, which downloads and executes JAR files from Maven Central. While this is a remote code execution pattern, it is the standard method for integrating Hudi with Spark and is considered low risk when targeting known repositories. - [PROMPT_INJECTION] (LOW): The skill introduces an indirect prompt injection surface (Category 8) because it enables the agent to ingest untrusted data from external table formats (S3, GCS, Azure) which could contain malicious instructions. Evidence Chain: 1. Ingestion points:
DeltaTable(delta-lake.md),catalog.load_table(iceberg.md), andspark.read.format("hudi")(hudi.md). 2. Boundary markers: Absent. 3. Capability inventory: File modification viawrite_deltalake,merge, andtable.append; Spark execution environment. 4. Sanitization: Absent. Given the context of data engineering, this is a standard risk factor rather than an active exploit. - [CREDENTIALS_UNSAFE] (INFO):
iceberg.mdcontains AWS credential placeholders (AKIA...). These are illustrative and do not expose real secrets.
Audit Metadata