roadmap
Fail
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The fallback execution instructions in
SKILL.mdcontain a hardcoded PostgreSQL connection string:postgresql://kbuser:TestPassword123!@localhost:5433/knowledgebase. This exposes a plaintext password (TestPassword123!) in the skill's source code. - [COMMAND_EXECUTION]: The skill provides a block of JavaScript code for the agent to execute if MCP tools are unavailable. This script utilizes the
pglibrary to manually establish a network connection to a local database and perform SQL queries, bypassing standard safety layers. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its handling of data from an external database.
- Ingestion points: The skill fetches and renders data from the
public.plansandpublic.storiestables (fields such astitle,summary, andplan_slug). - Boundary markers: There are no delimiters or explicit instructions to ignore potentially malicious content within the fetched data.
- Capability inventory: The skill possesses the capability to query databases and format complex Markdown responses.
- Sanitization: No escaping, filtering, or validation is applied to the data retrieved from the database before it is interpolated into the agent's output.
Recommendations
- AI detected serious security threats
Audit Metadata