skills/legout/data-platform-agent-skills/data-engineering-storage-remote-access-integrations-polars/Gen Agent Trust Hub
data-engineering-storage-remote-access-integrations-polars
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- PROMPT_INJECTION (HIGH): The skill facilitates reading data from external, attacker-controllable cloud storage buckets (S3, GCS, Azure), creating an Indirect Prompt Injection vector. Because the skill also provides write capabilities, the impact of such an injection is elevated.
- Ingestion points:
pl.read_parquet,pl.read_csv,pl.scan_parquet, andds.datasetcalls targeting remote URIs in SKILL.md. - Boundary markers: Absent. No delimiters or instructions to ignore embedded commands are included in the prompt templates.
- Capability inventory: The skill includes
df.write_parquetandpq.write_tablewhich allow writing data back to remote storage. - Sanitization: No evidence of data sanitization, schema validation, or content filtering before processing external data.
- CREDENTIALS_UNSAFE (LOW): The documentation explicitly references sensitive credential locations such as
~/.aws/credentialsand specific environment variables likeAWS_SECRET_ACCESS_KEY. While necessary for the library's functionality, these paths and variables are high-value targets for data exposure findings.
Recommendations
- AI detected serious security threats
Audit Metadata