raisindb-translations
Warn
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
localeClausefunction inSKILL.mdconstructs a SQL fragment using string interpolation:return `AND locale = '${current}'`;. This fragment is then concatenated into full SQL queries in thegetPageByPathandgetNavigationfunctions. Recommending string concatenation for SQL query construction is a significant security anti-pattern that leads to SQL injection vulnerabilities.- [PROMPT_INJECTION]: The skill outlines a vulnerability surface for indirect injection where client-side data affects server-side queries. Ingestion points: Data is fetched fromlocalStorageinlib/stores/locale.ts(specificallylocalStorage.getItem(STORAGE_KEY)). Boundary markers: None. The locale value is directly embedded into the SQL string without the use of placeholders or parameterized query techniques for that specific clause. Capability inventory: The skill executes database queries via thequeryandqueryOnefunctions within theQuerying with Localesection. Sanitization: The provided code example uses a simple whitelist for three locales, but the documentation encourages support for any BCP 47 code, increasing the likelihood that a developer will implement an unsafe or incomplete validation mechanism while continuing to use the vulnerable concatenation pattern.
Audit Metadata