databases

Pass

Audited by Gen Agent Trust Hub on Mar 3, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The script db_backup.py executes system binaries including mongodump, pg_dump, psql, and mongorestore using subprocess.run and subprocess.Popen. These tools are passed connection URIs provided at runtime.
  • [COMMAND_EXECUTION]: SKILL.md includes setup instructions that direct the user to run sudo apt-get install for system dependencies, which requires elevated privileges.
  • [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection (Category 8) because it ingests data from external databases and executes operations based on that data.
  • Ingestion points: db_performance_check.py samples document keys and collection names from MongoDB; db_migrate.py reads SQL and JSON from migration files.
  • Boundary markers: Absent in scripts processing external database content or migration files.
  • Capability inventory: Across db_backup.py and db_migrate.py, the skill can execute arbitrary system commands (subprocess) and SQL statements (psycopg2).
  • Sanitization: Migration files containing SQL instructions are executed directly via psycopg2 without validation or sanitization.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 3, 2026, 12:10 PM