pubchem-database
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION] (HIGH): The skill is vulnerable to indirect prompt injection via the processing of external data from PubChem.
- Ingestion points:
rate_limited_requestinscripts/bioactivity_query.pyand various search functions (e.g.,search_by_name,get_compound_properties) inscripts/compound_search.pyfetch data frompubchem.ncbi.nlm.nih.gov. - Boundary markers: No boundary markers or 'ignore embedded instructions' warnings are implemented when processing the API responses.
- Capability inventory: The skill includes a
download_structurefunction inscripts/compound_search.pythat can write files (SDF, JSON, PNG) to the local filesystem using a user-specified or data-derived filename. - Sanitization: There is no evidence of sanitization or path validation for the
filenameargument indownload_structure, making it potentially susceptible to path traversal if the filename is influenced by untrusted data. - [EXTERNAL_DOWNLOADS] (LOW): The skill performs network requests to an external resource.
- Evidence:
scripts/bioactivity_query.pyuses therequestslibrary to connect tohttps://pubchem.ncbi.nlm.nih.gov. - Context: While the target domain is a reputable government/academic resource, any external data source introduces a surface for indirect prompt injection.
Recommendations
- AI detected serious security threats
Audit Metadata