migrate-to-motherduck
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The validation SQL templates and Python artifacts (found in
references/MIGRATION_VALIDATION.mdandartifacts/migration_validation_example.py) build queries by interpolating variables likesource_table,target_table, andcolumndirectly into strings. This pattern is vulnerable to indirect prompt injection (SQL injection) if these identifiers are provided by an untrusted user or source. * Ingestion points: Table names and column names in the validation suite. * Boundary markers: Not used in the SQL generation logic. * Capability inventory: Database execution throughduckdb.DuckDBPyConnection.execute()and.sql(). * Sanitization: No escaping or validation is performed on the identifiers before interpolation. - [EXTERNAL_DOWNLOADS]: The skill utilizes the
uvpackage manager to fetch theduckdblibrary from standard public registries as part of its automated validation workflow.
Audit Metadata