osquery-query-helper
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/extract-table.shis vulnerable to command injection via the$TABLE_NAMEvariable. The script performs direct shell interpolation of the variable into anawkcommand string:awk '/..."'"$TABLE_NAME"'"/ ...'. A malicious user can provide a table name like"); system("id"); /to break out of the intended regex and execute arbitrary shell commands. - [COMMAND_EXECUTION]: The script
scripts/detect-format.shis vulnerable to command injection as it uses the$SCHEMA_FILEargument in a shell expansion without proper sanitization or validation, allowing an attacker to execute commands via shell metacharacters. - [PROMPT_INJECTION]: The skill provides an attack surface for indirect prompt injection by accepting untrusted user-supplied strings and using them as arguments for shell-based tools. Ingestion points: User-provided table names and search keywords used in the workflow steps. Boundary markers: No delimiters or instructions to ignore embedded commands are present in the skill guidelines. Capability inventory: Execution of
bash,awk, andgrepon the local filesystem. Sanitization: No validation, escaping, or sanitization logic is implemented in the shell scripts or the agent's instructions.
Recommendations
- AI detected serious security threats
Audit Metadata