zhin-database-orm

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [PROMPT_INJECTION] (SAFE): No instructions attempting to override or bypass AI safety guardrails were detected.- [DATA_EXFILTRATION] (SAFE): The skill focuses on local database interactions (SQLite) and does not contain patterns for unauthorized data transmission or access to sensitive system files.- [REMOTE_CODE_EXECUTION] (SAFE): References to '@zhin.js/database' and 'zhin.js' are consistent with the framework's stated purpose. No remote script execution or unverifiable package installations are present.- [INDIRECT_PROMPT_INJECTION] (LOW): The skill defines data ingestion points through CRUD operations like 'User.create' and 'User.update'. While it uses structured ORM queries that mitigate traditional SQL injection, it lacks explicit boundary markers or instructions for the agent to sanitize untrusted input before storage. Capability inventory includes database read/write access.- [DYNAMIC_EXECUTION] (SAFE): The use of 'db.literal' for atomic increments is a standard ORM feature and is used here with static strings, posing no risk of dynamic code injection.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:47 PM