postgresql
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSNO_CODEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (CRITICAL): Confirmed malicious URL detection.
- Evidence: The file
references/index.mdexplicitly listssql.mdas a documentation resource. - Detection: Automated scanner
URLiteflaggedsql.mdas a blacklisted malicious URL (Alert ID: URE40E38848FEE8F9C-0200). - Analysis: The use of the
.mdTop-Level Domain (Moldova) for a domain name likesql.mdappears to be a deliberate attempt to trick agents or users into interpreting an external network resource as a local markdown file. - [NO_CODE] (SAFE): No executable scripts, Python/Node.js packages, or other programmatic files were detected. The skill is limited to documentation, which reduces the immediate attack surface for binary exploitation but does not mitigate link-based risks.
- [PROMPT_INJECTION] (LOW): The documentation structure presents an indirect prompt injection surface.
- Ingestion points:
references/index.mdserves as an entry point for processing external documentation files. - Boundary markers: Absent; the skill provides no delimiters to prevent the agent from following instructions embedded in the linked files.
- Capability inventory: None detected; no code capabilities like subprocess or network requests are provided by the skill itself.
- Sanitization: None; the skill does not sanitize the contents of the referenced documentation.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata