api-search-elasticsearch
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFEPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) by facilitating the ingestion and processing of untrusted data from external sources for indexing and search operations.
- Ingestion points: The skill demonstrates reading data from local files using
node:fsandnode:readlineinexamples/bulk-operations.md, and accepting arbitrary user query strings for searches inexamples/core.md. - Boundary markers: No specific delimiters or "ignore embedded instructions" warnings are employed when interpolating external data into search queries or index operations.
- Capability inventory: The skill provides tools for network communication via the
@elastic/elasticsearchclient and file system access. - Sanitization: The provided examples do not include explicit sanitization or validation logic for the ingested content before it is processed by the search engine.
- [CREDENTIALS_UNSAFE]:
SKILL.mdandexamples/core.mdcontain code snippets illustrating hardcoded credentials (username: "elastic", password: "changeme"). While these are explicitly presented as a 'Bad Example' and documented as an anti-pattern for educational purposes, they represent a credential exposure pattern.
Audit Metadata