schema-auto-tagger
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runto interact with the Treasure Data command-line tool (tdx). It invokestdx auth showinschema_auto_tagger_implementation.pyto retrieve API keys and usestdx tablesandtdx show schemainworkflow_scripts/scan_schema.pyto collect database metadata. These operations are essential for the skill's core functionality and use standard platform utilities. - [EXTERNAL_DOWNLOADS]: The skill makes network requests to the official Treasure Data API (
api.treasuredata.com) to manage policy tags and sends notifications to user-configured Slack webhooks inworkflow_scripts/send_notification.py. These connections target well-known services and are core to the skill's intended purpose. - [PROMPT_INJECTION]: The skill reads column names and descriptions from database schemas, which serves as an indirect input surface. However, the analysis logic relies on static regular expressions in
schema_auto_tagger_implementation.pyandschema_tagger_rules.yamlto generate suggestions, rather than interpreting the data as instructions, effectively mitigating the risk of injection. - [CREDENTIALS_UNSAFE]: Security best practices are followed for credential management. Secrets such as
TD_API_KEYandSLACK_WEBHOOKare retrieved from environment variables or workflow secrets, and the documentation provides clear instructions on using.envfiles and secure secret storage.
Audit Metadata