odoo-upgrade
Fail
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/test_upgrade.pyusesos.system()to run shell commands constructed with f-strings (e.g.,os.system(f'python "{precheck_script}" "{test_dir}"')). This pattern is vulnerable to command injection if paths are manipulated. - [DATA_EXFILTRATION]: The skill includes code in
scripts/auto_fix_library.pyandscripts/fix_rpc_service.pythat generates JavaScriptfetch()calls. While intended for Odoo RPC, this capability can be leveraged for data exfiltration if an attacker controls the endpoint. - [PROMPT_INJECTION]: The skill processes external Odoo modules (Python, XML, JS) through scripts like
scripts/syntax_validator.pyandscripts/upgrade_to_odoo19.pywithout sanitization or boundary markers. - Ingestion points: File read operations across the project directory in all major scripts.
- Boundary markers: No markers are present to isolate processed data from agent instructions.
- Capability inventory: Allowed access to the
Bashtool and file system modification. - Sanitization: Content is processed using regex without escaping or validation of untrusted inputs.
Recommendations
- AI detected serious security threats
Audit Metadata