peach-db-migrate
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill frequently executes shell commands via the
bun runruntime to perform database operations (db:status-dev,db:up-dev,db:down-dev). These commands have direct access to the local development environment and database. - [CREDENTIALS_UNSAFE]: The skill documentation explicitly points the agent to
api/db/dev.envto verify connection details if a database connection failure occurs. This file is a sensitive configuration path that typically contains plaintext credentials likeDATABASE_URL. - [PROMPT_INJECTION]: The
bun run db:new {migration_name}command incorporates user-supplied text directly into a shell execution string, creating a surface for indirect prompt injection or command injection. - Ingestion points: User-provided
{migration_name}passed via natural language instructions. - Boundary markers: None. The variable is interpolated directly into the bash command string.
- Capability inventory: Execution of shell commands via
bun runacross multiple workflows inSKILL.md. - Sanitization: None. There are no instructions or scripts provided to validate or escape special shell characters (e.g.,
;,&&,`) in the user input before it is executed.
Audit Metadata