db-backup-restore
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill accesses sensitive private SSH key files on the host system to authenticate with remote servers.
- Evidence: Paths
~/.ssh/keys/production-server.keyand~/Chatwit-Social-dev/id_rsa.v3are explicitly referenced for use in SSH commands inSKILL.md. - [COMMAND_EXECUTION]: The skill executes arbitrary commands on a remote production server via SSH and interacts directly with Docker containers.
- Evidence: Use of
ssh -i "$SSH_KEY" "$PROD_HOST"to executedocker execandpg_dumpon the remote host49.13.155.94inSKILL.md. - [COMMAND_EXECUTION]: The skill is susceptible to indirect prompt injection because it processes and acts upon untrusted output from external commands.
- Ingestion points: Reads and parses the output of
psql -lqtanddocker pscommands inSKILL.md. - Boundary markers: Absent; there are no delimiters or instructions to ignore embedded commands in the processed data.
- Capability inventory: Includes remote command execution (
ssh), local container management (docker), and file system write access (>). - Sanitization: Absent; relies on basic shell utilities like
cut,sed, andgrepwhich do not provide security-hardened parsing.
Audit Metadata