ms-access
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The VBA automation code for linking SQL Server tables contains a hardcoded connection string with literal credentials. Evidence: 'UID=admin;PWD=password;'.
- [COMMAND_EXECUTION]: The skill provides VBA scripts that perform file system operations using hardcoded absolute file paths on the C: drive, which can lead to unauthorized access or system errors. Evidence: 'C:\Reports\' and 'C:\Data\import.csv'.
- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface by importing and processing data from external CSV files without proper sanitization. Ingestion points: 'C:\Data\import.csv' in SKILL.md. Boundary markers: Absent. Capability inventory: 'CurrentDb.Execute' and 'DoCmd.OutputTo'. Sanitization: Absent.
Recommendations
- AI detected serious security threats
Audit Metadata