cloud-sql-sqlserver-monitor
Fail
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
get_system_metrics.jsis vulnerable to command injection on Windows. When usingchild_process.spawnwithshell: true, it only quotes arguments that contain double quotes. Arguments without double quotes that contain shell metacharacters such as&,|, or^are passed to the shell unquoted, allowing for arbitrary command execution if an attacker can influence the script's input.\n- [EXTERNAL_DOWNLOADS]: The skill usesnpxto download and execute the@toolbox-sdk/serverpackage from the official NPM registry at runtime, which introduces a dependency on external code.
Recommendations
- AI detected serious security threats
Audit Metadata