knowledge-base-builder
Pass
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [Command Execution] (LOW): The Bash CLI template is vulnerable to SQL injection. The search function directly interpolates user-provided arguments into a SQLite query string without escaping or sanitization. Evidence:
WHERE chunks_fts MATCH '$1'in thesearch()bash function. This allows a user or a malicious query to execute arbitrary SQL commands on the local database. - [Indirect Prompt Injection] (LOW): The skill processes untrusted document collections, making it vulnerable to malicious instructions embedded in documents (e.g., PDF or Word files). 1. Ingestion points:
extract_pdf_textinSKILL.mdreads content from local file paths provided by the user. 2. Boundary markers: Absent. The skill chunks and indexes raw text without delimiters or warnings to downstream agents. 3. Capability inventory: File system read access viapathliband local database persistence viasqlite3. 4. Sanitization: Absent. Extracted text is inserted directly into the FTS5 index without filtering or validation.
Audit Metadata