bookstrap-query

Fail

Audited by Gen Agent Trust Hub on Apr 16, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides instructions for executing shell commands that interpolate user-supplied natural language questions directly into a Bash command line: python scripts/generate-embedding.py --text "$user_question". This pattern is vulnerable to arbitrary command execution if the user input contains shell metacharacters such as backticks or semicolons.- [CREDENTIALS_UNSAFE]: The example command for database access contains hardcoded administrative credentials (--user root --pass root) for the SurrealDB instance.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from the database and user input without defined boundary markers or sanitization. * Ingestion points: User questions and database content (section content, source titles) processed in SKILL.md. * Boundary markers: Absent in implementation examples. * Capability inventory: Bash (shell execution) and Read (file access). * Sanitization: No sanitization or validation of external content is described before interpolation into prompts or shell commands.- [COMMAND_EXECUTION]: The skill performs dynamic construction of database queries based on natural language parsing. Without robust sanitization, this allows for potential database query injection attacks where a malicious user could craft a question that executes unauthorized SurrealDB operations.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 16, 2026, 08:06 AM