frappe-restore-latest-backup-task

Fail

Audited by Gen Agent Trust Hub on May 6, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The skill contains multiple hardcoded sensitive credentials in both instructional commands and the provided automation script.
  • Evidence: MariaDB root password set to 123 in commands like mariadb -h mariadb -u root -p123.
  • Evidence: Application Administrator password set to admin via bench --site development.localhost set-admin-password admin.
  • Note: While the site is intended for development.localhost, hardcoding credentials in skill instructions is a security risk.
  • [COMMAND_EXECUTION]: The skill performs high-privilege administrative tasks that modify the global state of the environment.
  • Evidence: Modifies global database system variables using SET GLOBAL max_allowed_packet=536870912; which affects the entire MariaDB instance.
  • Evidence: Accesses the database as the root user to perform restorations and privilege management.
  • [COMMAND_EXECUTION]: The skill instructs the creation and execution of shell scripts at runtime.
  • Evidence: The 'Automated Script' section provides a full bash script and instructs the user to make it executable using chmod +x restore-latest.sh.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
May 6, 2026, 08:40 PM