database-tools
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill uses hardcoded passwords in its connection and user management examples.
- The environment variable
PGPASSWORD=secretis explicitly used in the PostgreSQL connection example. - The SQL command
CREATE USER newuser WITH PASSWORD 'secret'is included in the user management section. - [DATA_EXFILTRATION]: The skill provides commands to access sensitive system log files that may contain sensitive database activity or credentials.
- It utilizes
tail -f /var/log/postgresql/postgresql.logto monitor slow queries, which is a path to sensitive system logs. - [COMMAND_EXECUTION]: The skill relies on shell command execution to perform its primary functions.
- It executes
sqlite3,psql,pg_dump, and system utilities likelsandtailvia shell subprocesses. - [PROMPT_INJECTION]: The skill has a large attack surface for indirect prompt injection via untrusted database content.
- Ingestion points: Untrusted data enters the agent context through database query results (e.g.,
sqlite3 my.db "SELECT * FROM users;"). - Boundary markers: There are no delimiters or instructions provided to the agent to treat database content as untrusted or to ignore embedded instructions.
- Capability inventory: The skill has extensive capabilities including shell command execution (
sqlite3,psql), file system access (ls,tail), and database administrative functions. - Sanitization: No evidence of sanitization or validation of data retrieved from the database is present before the agent processes it.
Recommendations
- AI detected serious security threats
Audit Metadata