vdb-cleanup

Pass

Audited by Gen Agent Trust Hub on Mar 8, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Executes local Python scripts including cleanup.py, vector_consistency_check.py, and query.py to manage the state of the ChromaDB vector store.
  • [COMMAND_EXECUTION]: Performs a network heartbeat check using curl against a service on the local loopback address 127.0.0.1.
  • [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface through the ingestion and processing of data stored in the vector database.
  • Ingestion points: The scripts cleanup.py and query.py read data originating from the filesystem and stored within the vector database.
  • Boundary markers: The instructions provide no explicit delimiters or directives to the agent to disregard instructions that may be embedded in the retrieved data.
  • Capability inventory: The skill uses the Bash, Read, and Write tools to execute system commands and modify files.
  • Sanitization: There is no evidence of sanitization or filtering of the content retrieved from the database before it is handled by the agent.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 8, 2026, 12:10 AM