frappe-system-console
Pass
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/run_console.pyenables the execution of Python and SQL snippets via the Frappeexecute_codemethod. This script grants elevated internal privileges by programmatically setting the user toAdministratorand allows the agent to trigger code execution on the host system where the Frappe bench is installed. - [DATA_EXFILTRATION]: As documented in
REFERENCE.md, the sandboxed environment supports network operations through functions likefrappe.make_get_requestandfrappe.make_post_request. These capabilities could be leveraged to exfiltrate data from the Frappe database to external endpoints. - [PROMPT_INJECTION]: The
APP-EXTENSIONS.mdfile instructs the agent to scan and interpret workspace files (hooks.pyand related Python modules) to discover custom API extensions. This process exposes the agent to untrusted data within the local repository. - Ingestion points: Scanning
hooks.pyfiles and following imports across theapps/directory in the local workspace. - Boundary markers: None; the instructions do not specify delimiters or provide warnings to ignore embedded instructions within the analyzed workspace code.
- Capability inventory: The agent is provided with powerful capabilities including database modification (
frappe.db.set_value), network requests (frappe.make_post_request), and background job queuing (frappe.enqueue). - Sanitization: No validation or sanitization of the workspace content is implemented before the agent processes the code to determine the available namespace extensions.
Audit Metadata