message-queues

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: HIGHCREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [CREDENTIALS_UNSAFE] (HIGH): Hardcoded default credentials ('guest:guest') are present in connection strings within 'references/faststream-patterns.md'. Evidence: 'broker = RabbitBroker("amqp://guest:guest@localhost/")'.
  • [PROMPT_INJECTION] (HIGH): Category 8 (Indirect Prompt Injection) vulnerability surface. The skill demonstrates ingesting untrusted data from message brokers with subsequent side effects. * Ingestion points: 'references/faststream-patterns.md' (@broker.subscriber) and 'references/rabbitmq-patterns.md' (queue.iterator()). * Boundary markers: Absent. No usage of delimiters or instructions to ignore embedded commands. * Capability inventory: Database modification (db.add, db.execute), message publishing, and logging. * Sanitization: Inconsistent; while FastStream uses Pydantic, the raw RabbitMQ patterns use 'json.loads()' without validation.
  • [EXTERNAL_DOWNLOADS] (MEDIUM): Recommends installation of the 'faststream' library and its dependencies via pip. This source is not included in the Trusted External Sources list.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 10:05 PM