etl-incremental-patterns
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill demonstrates a high-risk pattern where untrusted strings are interpolated directly into SQL statements.
- Ingestion points: The
tableandtimestamp_colarguments in functions likeincremental_by_timestampandfull_refresh_with_swapare likely to be populated from external configurations or database schemas. - Capability inventory: The skill uses
sqlalchemy(implied byengine.begin()) and hasBashandWritepermissions, allowing for significant system impact if the SQL execution is compromised. - Sanitization: There is no evidence of identifier quoting or validation (e.g., checking against a whitelist or using SQLAlchemy's
quoted_name). - Evidence: The line
query = f"SELECT * FROM {table} WHERE {timestamp_col} > :last_run"inSKILL.mdallows for SQL injection through the{table}and{timestamp_col}variables. - [Command Execution] (LOW): The skill requests
Bashtool access. While common for ETL tasks, in combination with the injection vulnerabilities mentioned above, it increases the potential for an attacker to pivot from a database compromise to local system access if the agent uses the tool to verify or move data files.
Recommendations
- AI detected serious security threats
Audit Metadata