rill-clickhouse
Warn
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes several local commands to manage the environment and perform diagnostics.
- Runs
rill start . --no-ui --no-open --verbose --log-format jsonwhich initiates a local server process. - Executes
rill querywith dynamically constructed SQL strings and user-influenced limits, which could be exploited if inputs are not properly sanitized. - Instructs users to run
npx skills add clickhouse/agent-skillsto install external dependencies. - [EXTERNAL_DOWNLOADS]: Fetches configuration and rule sets from well-known technology sources.
- Downloads Rill rule files from official repositories including
github.com/rilldata/rillanddocs.rilldata.com. - References best practice rules from the
ClickHouse/agent-skillsrepository on GitHub. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection via the processing of external data structures.
- Ingestion points: Reads
rill.yaml, model SQL/YAML files, and metadata from source providers like AWS S3 or Google Cloud Storage. - Boundary markers: Lacks explicit boundary markers or isolation when processing external source info into model definitions.
- Capability inventory: Includes file read/write operations, local service execution (
rill start), and SQL query execution (rill query). - Sanitization: No explicit sanitization or validation of the input source paths or SQL intents before they are processed by the Rill CLI.
Audit Metadata