databases
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
db_backup.pyexecutes system binaries includingmongodump,pg_dump,psql, andmongorestoreusingsubprocess.runandsubprocess.Popen. These tools are passed connection URIs provided at runtime. - [COMMAND_EXECUTION]:
SKILL.mdincludes setup instructions that direct the user to runsudo apt-get installfor system dependencies, which requires elevated privileges. - [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection (Category 8) because it ingests data from external databases and executes operations based on that data.
- Ingestion points:
db_performance_check.pysamples document keys and collection names from MongoDB;db_migrate.pyreads SQL and JSON from migration files. - Boundary markers: Absent in scripts processing external database content or migration files.
- Capability inventory: Across
db_backup.pyanddb_migrate.py, the skill can execute arbitrary system commands (subprocess) and SQL statements (psycopg2). - Sanitization: Migration files containing SQL instructions are executed directly via
psycopg2without validation or sanitization.
Audit Metadata