async-python-patterns
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill includes code patterns that illustrate potential vulnerability surfaces for indirect prompt injection.
- Ingestion points:
resources/implementation-playbook.mdincludes aget_user_datafunction that takes auser_idinput. - Boundary markers: No delimiters or instructions are used to isolate the variable from the command context.
- Capability inventory: The skill demonstrates simulated database access and query execution.
- Sanitization: In the provided example, SQL queries are constructed using f-string interpolation, which is a significant security risk (SQL injection) if applied to production environments with untrusted input.
- [EXTERNAL_DOWNLOADS]: The skill references network communication using established libraries.
- Examples use
aiohttpfor making asynchronous HTTP requests to external domains. - The code includes references to well-known technology and testing resources such as
httpbin.organdapi.example.com.
Audit Metadata