db-generate
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to executenpx medusa db:generate <module-name>. Directly interpolating user-provided arguments into shell commands can lead to arbitrary code execution if the inputs are not properly sanitized. - [PROMPT_INJECTION]: The skill is vulnerable to indirect command injection through the
<module-name>argument, allowing a user to potentially execute unintended commands. - Ingestion points: The
<module-name>argument provided by the user in theSKILL.mdfile. - Boundary markers: None. The user input is concatenated directly into the shell command string without delimiters or warnings to the agent.
- Capability inventory: The skill possesses the capability to execute shell commands via the
Bashtool, restricted to patterns matchingnpx medusa db:generate:*. - Sanitization: There is no evidence of input validation, character escaping, or sanitization for the
<module-name>argument. - [EXTERNAL_DOWNLOADS]: The skill utilizes
npxto execute themedusacommand-line tool, which may trigger the download of the package from the npm registry. Themedusapackage is an official resource associated with the author,medusajs.
Audit Metadata