vdb-cleanup
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes local Python scripts including cleanup.py, vector_consistency_check.py, and query.py to manage the state of the ChromaDB vector store.
- [COMMAND_EXECUTION]: Performs a network heartbeat check using curl against a service on the local loopback address 127.0.0.1.
- [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface through the ingestion and processing of data stored in the vector database.
- Ingestion points: The scripts cleanup.py and query.py read data originating from the filesystem and stored within the vector database.
- Boundary markers: The instructions provide no explicit delimiters or directives to the agent to disregard instructions that may be embedded in the retrieved data.
- Capability inventory: The skill uses the Bash, Read, and Write tools to execute system commands and modify files.
- Sanitization: There is no evidence of sanitization or filtering of the content retrieved from the database before it is handled by the agent.
Audit Metadata