cloud-sql-mysql-data
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts in this skill use the Node.js
child_process.spawnfunction to execute external commands. Specifically, they invokenpx(ornpx.cmdon Windows) to launch a toolbox server component. - [EXTERNAL_DOWNLOADS]: The skill uses
npxto download and execute the@toolbox-sdk/serverpackage (version 1.1.0) from the NPM registry at runtime. NPM is a well-known public registry used for managing software dependencies. - [CREDENTIALS_UNSAFE]: The
mergeEnvVarsfunction in the scripts reads sensitive environment variables, such asCLOUD_SQL_MYSQL_PASSWORD, from a.envfile located in the project's root directory. These credentials are required to authenticate the toolbox server with the MySQL database instance. - [PROMPT_INJECTION]: The
execute_sqlandget_query_plantools accept raw SQL strings as input parameters. This creates a surface for indirect prompt injection where an agent might be manipulated into executing malicious SQL commands if it processes untrusted data. - Ingestion points: The
sqlandsql_statementparameters in theexecute_sql.jsandget_query_plan.jsscripts. - Boundary markers: No specific delimiters or safety instructions are used to wrap the SQL input to prevent the agent from executing embedded instructions.
- Capability inventory: The skill provides full capabilities to read from and write to the connected MySQL database via the
execute_sqltool. - Sanitization: No input validation or sanitization is performed on the SQL strings within the wrapper scripts before they are passed to the underlying execution engine.
Audit Metadata