nocobase-data-modeling
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute local scripts (get-swagger.shandnocobase-api.sh) with parameters derived directly from user input. Specifically, the<METHOD>,<ENDPOINT>, and[JSON_OR_FILE]arguments are passed to shell commands. This dynamic assembly of commands without visible sanitization or escaping could allow for command injection if an attacker provides inputs containing shell metacharacters like semicolons, pipes, or backticks. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection, which could lead to unauthorized actions if the agent processes malicious instructions embedded in external data.
- Ingestion points: User-provided strings for collection names, operations, and JSON payloads, as well as the content of Swagger/OpenAPI specifications fetched via
get-swagger.shfrom the NocoBase server. - Boundary markers: None. The workflow does not utilize delimiters or specific instructions to the agent to disregard embedded directives within the processed data.
- Capability inventory: The skill possesses
Bashexecution privileges to interact with the system andReadaccess to local files. - Sanitization: None. There is no evidence of validation, filtering, or escaping of inputs before they are interpolated into execution strings or used to drive agent logic.
Audit Metadata