supabase-realtime

Warn

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill instructs the user to download a pre-compiled binary (websocat) from a third-party GitHub repository (github.com/vi/websocat) that is not part of the trusted organization or well-known service list.
  • [COMMAND_EXECUTION]: The installation steps for the downloaded binary require the use of sudo to move the file into /usr/local/bin/, which constitutes a privilege escalation pattern.
  • [PROMPT_INJECTION]: The skill implements a real-time database listener that processes data from Supabase, creating an indirect prompt injection surface. Ingestion points: Data is received from the database via websocat and processed in the process-changes.sh script. Boundary markers: There are no markers or instructions provided to separate the untrusted data from the processing logic. Capability inventory: The skill uses jq for parsing and shell case statements for logic execution based on the untrusted input. Sanitization: The script uses JSON parsing but lacks validation or sanitization of the record content before use.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 1, 2026, 01:38 AM