firestore-data
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The scripts utilize
npxto download and execute the@toolbox-sdk/serverpackage at runtime. This is the intended method for invoking the underlying Firestore bridge tool. - [COMMAND_EXECUTION]: The skill uses
child_process.spawnto execute CLI commands. It includes robust platform-specific handling (e.g., usingnpx.cmdand shell execution on Windows) to ensure the scripts run correctly across different operating systems. - [DATA_EXFILTRATION]: To authenticate with Firestore, the scripts are configured to read project-specific environment variables from
.envfiles located in the project directory hierarchy. This data is passed directly to the backend process to establish a database connection. - [PROMPT_INJECTION]: The skill processes document data from Firestore, which represents an indirect prompt injection surface. Data stored in the database by external users could theoretically contain instructions aimed at manipulating the agent's behavior.
- Ingestion points: Document data returned by the
get_documentsandquery_collectionscripts. - Boundary markers: None identified in the script output; data is interpolated directly into the agent context.
- Capability inventory: The skill can perform write, update, and delete operations on Firestore and has the ability to execute shell commands via
spawn. - Sanitization: No specific filtering or validation of the retrieved document content is performed before it is provided to the agent.
- [SAFE]: The scripts are licensed under Apache 2.0 by Google LLC and demonstrate behavior consistent with official cloud management utilities. No evidence of malicious obfuscation, persistence mechanisms, or unauthorized data harvesting was found.
Audit Metadata