drugbank-database
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [Dynamic Execution] (MEDIUM): The file
references/data-access.mdrecommends usingpickle.load()to cache parsed drug data. This is an insecure deserialization pattern; if thedrugbank_parsed.pklfile is replaced by an attacker, it allows for arbitrary code execution. - [Unverifiable Dependencies] (MEDIUM): The skill requires the installation of
drugbank-downloaderandbioversionsfrom PyPI. These are not part of the trusted repository list and represent an unverified dependency chain for pharmaceutical data handling. - [External Downloads] (LOW): The skill performs automated downloads of large XML datasets from
go.drugbank.comvia thedrugbank-downloaderutility. While this is the official source, it involves external network operations to a non-whitelisted domain. - [Indirect Prompt Injection] (LOW): The skill is designed to ingest and process large amounts of untrusted external data (XML/JSON) which could contain malicious instructions.
- Ingestion points:
download_drugbank()fetches XML files;requests.get()fetches JSON data from the DrugBank API. - Boundary markers: None. The skill does not implement delimiters or 'ignore instructions' warnings when processing drug descriptions or indications.
- Capability inventory:
requests.get(Network),pickle.dump/load(File System/Execution). - Sanitization: The skill lacks explicit sanitization or validation logic for the content extracted from the DrugBank database before it is presented to the agent.
Audit Metadata