cloud-sql-mysql-lifecycle
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: All scripts in the skill utilize the
npxutility to download and execute the@toolbox-sdk/server@1.1.0package from the public NPM registry during execution.- [COMMAND_EXECUTION]: The skill useschild_process.spawnto run commands. In Windows environments, it enables shell execution and applies a sanitization routine that escapes double quotes in user-provided arguments to mitigate command injection risks.- [DATA_EXPOSURE]: The scripts contain logic to search for and read.envfiles in parent directories (../../../.env) to load sensitive credentials such asCLOUD_SQL_MYSQL_PASSWORDandCLOUD_SQL_MYSQL_USERfor database operations.- [INDIRECT_PROMPT_INJECTION]: The skill processes user-supplied parameters directly into shell commands. Ingestion points: Input parameters received viaprocess.argvin all scripts (e.g.,clone_instance.js,restore_backup.js). Boundary markers: None identified. Capability inventory:child_process.spawnwith shell access enabled on Windows. Sanitization: Includes a basic quote-doubling escape mechanism for Windows shell compatibility.
Audit Metadata