prisma-cli
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The
prisma db seedcommand executes arbitrary scripts defined in theprisma.config.tsfile. This allows for the execution of code within the development environment, which could be exploited if the configuration or the script itself is compromised.\n- COMMAND_EXECUTION (MEDIUM): Theprisma db executecommand enables running raw SQL scripts from a file or standard input. If used by an agent on untrusted input, this could lead to unauthorized database operations or data manipulation.\n- PROMPT_INJECTION (LOW): Theprisma init --promptcommand represents an indirect prompt injection surface, as it ingests natural language to generate database schema code, which may be influenced by malicious instructions in the prompt.\n- EXTERNAL_DOWNLOADS (LOW): The use ofbunxmentioned in the documentation can lead to the download and execution of external packages from the npm registry during runtime.
Audit Metadata