skill-system-postgres
Warn
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The Python scripts utilize dynamic loading to execute code from filesystem paths computed at runtime:
scripts/architecture_graph.py,scripts/projection_engine.py, andscripts/rule_projection.pyuseimportlib.utilto load and execute modules (such astickets.py) from relative paths within the project structure.- [COMMAND_EXECUTION]: The skill manifest and documentation describe operations that invoke the
psqlcommand-line utility: - Entrypoints are defined to run
psqlfor initializing schemas and applying migration files (e.g.,init.sql,migrate-v7-behavior-graph.sql). - Documentation recommends executing these commands with the high-privilege
postgressuperuser account. - [PROMPT_INJECTION]: The skill processes repository content into documentation, which constitutes an indirect prompt injection surface:
- Ingestion points: Data is read from files within
skills/,note/,review/,spec/, anddocs/directories. - Boundary markers: The projection engine uses
<!-- GENERATED_START -->and<!-- GENERATED_END -->markers in its generated markdown files. - Capability inventory: The skill possesses capabilities for shell command execution (
psql) and filesystem write operations. - Sanitization: There is no evidence of content sanitization or validation for ingested file data prior to processing or projection.
Audit Metadata