supabase-workflow
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): Provides wrappers for running arbitrary SQL queries using
bun run supabase:sql --queryand a local./supabase-cli. This creates a significant SQL injection surface if the agent interpolates untrusted user input into these queries without proper sanitization.\n- COMMAND_EXECUTION (MEDIUM): The skill explicitly instructs the agent to setverify_jwt = falseinsupabase/config.toml. This is a security-regressive configuration that disables the default authentication layer for Supabase Edge Functions, potentially exposing them to unauthorized access.\n- COMMAND_EXECUTION (LOW): Includes destructive filesystem operations such asrm -rffor deleting local edge function directories, which could be risky if the function name is manipulated.
Audit Metadata