perfetto-sql
Pass
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches the
trace_processorPython wrapper fromhttps://get.perfetto.dev/trace_processor. This domain belongs to the official Perfetto project maintained by Google, a trusted organization. - [REMOTE_CODE_EXECUTION]: The execution protocol involves downloading a script and executing it locally using
./trace_processor. While this matches remote code execution patterns, the source is a trusted well-known service, and the behavior is essential for the skill's primary function. - [COMMAND_EXECUTION]: The skill uses the
trace_processorCLI tool to execute SQL queries. It also includes instructions to modify file permissions usingchmod +xduring tool setup. - [PROMPT_INJECTION]: The skill's 'Precedence Rule' in Step 1 instructs the agent to prioritize user-provided SQL queries without modification, bypassing the dissect and research phase. This creates a surface for indirect prompt injection if malicious instructions are embedded in the user's data intents.
- Ingestion points: User-provided queries in the initial request (SKILL.md Step 1.2).
- Boundary markers: No specific delimiters or 'ignore embedded instructions' warnings are mandated for user SQL input.
- Capability inventory: Shell execution of the
trace_processortool (SKILL.md Step 2.36). - Sanitization: The skill mitigates risk through a mandatory validation loop (Step 2) that checks syntax, schema existence, and adherence to specific SQL constraints before execution.
Audit Metadata