librarian
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill securely manages database credentials by referencing environment variables (
${DB2i_HOST},${DB2i_USER},${DB2i_PASS}) intools/librarian.yamlrather than hardcoding sensitive information. - [SAFE]: All tools defined in
tools/librarian.yamlare strictly read-only, as indicated by thesecurity: readOnly: trueandreadOnlyHint: truemetadata, which restricts the skill's impact to informational data retrieval. - [SAFE]: The SQL statements utilize named parameter binding (e.g.,
:library_name,:list_type,:object_schema) to safely pass user input to the IBM i database, effectively preventing SQL injection attacks. - [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection because it retrieves user-controllable metadata (such as
OBJTEXTandTEXT_DESCRIPTION) from the IBM i system. If a malicious user with object-creation permissions on the system populates these fields with instructions, they could potentially influence the agent's behavior when it processes the query results. - Ingestion points: Tools such as
get_library_infoandlist_library_objectsintools/librarian.yamlfetch data from theQSYS2.OBJECT_STATISTICStable function. - Boundary markers: None present in the tool output processing.
- Capability inventory: The skill provides access to read-only system metadata via the
ibmitool. - Sanitization: None detected for descriptive text fields retrieved from the database.
- [SAFE]: The
ignore-unauthorized: truesetting in theibmi-systemsource configuration allows the connection to proceed even if SSL certificates cannot be verified. While this may increase risk in untrusted networks, it is a standard configuration for internal legacy database environments and does not constitute a malicious pattern.
Audit Metadata