frappe-restore-latest-backup-task
Fail
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill contains multiple hardcoded sensitive credentials in both instructional commands and the provided automation script.
- Evidence: MariaDB root password set to
123in commands likemariadb -h mariadb -u root -p123. - Evidence: Application Administrator password set to
adminviabench --site development.localhost set-admin-password admin. - Note: While the site is intended for
development.localhost, hardcoding credentials in skill instructions is a security risk. - [COMMAND_EXECUTION]: The skill performs high-privilege administrative tasks that modify the global state of the environment.
- Evidence: Modifies global database system variables using
SET GLOBAL max_allowed_packet=536870912;which affects the entire MariaDB instance. - Evidence: Accesses the database as the
rootuser to perform restorations and privilege management. - [COMMAND_EXECUTION]: The skill instructs the creation and execution of shell scripts at runtime.
- Evidence: The 'Automated Script' section provides a full bash script and instructs the user to make it executable using
chmod +x restore-latest.sh.
Recommendations
- AI detected serious security threats
Audit Metadata