create-migration
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill allows the agent to process potentially untrusted input to generate migration logic and file names, creating a high-risk capability-to-content bridge.
- Ingestion points: User-provided migration names and SQL content (SKILL.md, Steps 1 and 2).
- Boundary markers: Absent; there are no delimiters or explicit instructions to ignore embedded commands in user-provided data.
- Capability inventory: Execution of shell commands via
taskanddocker, writing to the local file system (Go files), and executing arbitrary SQL viatx.ExecContext. - Sanitization: Absent; no validation or escaping mechanisms are described for the migration names or SQL strings.
- [Dynamic Execution] (HIGH): The skill facilitates the creation of Go files in the
migrations/directory that are subsequently compiled and executed usingtask migrate:up. This runtime compilation and execution of generated source code is a high-severity pattern. - [Unverifiable Dependencies] (LOW): The skill references
github.com/pressly/goose/v3. As this is a well-known and established library in the Go ecosystem, it is treated as a trusted source under [TRUST-SCOPE-RULE].
Recommendations
- AI detected serious security threats
Audit Metadata