skills/mukul975/anthropic-cybersecurity-skills/implementing-pam-for-database-access/Gen Agent Trust Hub
implementing-pam-for-database-access
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/agent.pypasses administrative database passwords as command-line arguments using the-pflag for MySQL and the-Pflag for SQL Server. This practice is insecure as command-line arguments are visible in plain text to other users and monitoring tools through the system's process list.\n- [COMMAND_EXECUTION]: The skill usessubprocess.runto execute external binaries includingpsql,mysql,sqlcmd, andopenssl. While it uses list-based arguments to prevent shell injection, the execution of these commands with administrative privileges constitutes a sensitive capability.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) by ingesting and processing untrusted data from database environments.\n - Ingestion points: Database user lists, permission metadata, and configuration settings are retrieved via CLI tools in
scripts/agent.py.\n - Boundary markers: No delimiters or instructions are used to distinguish retrieved database data from the agent's own instructions in the audit report.\n
- Capability inventory: The skill has the capability to execute shell commands via
subprocess.runand write output files to the local system.\n - Sanitization: The skill performs no validation, escaping, or sanitization of the data retrieved from the database before including it in the final audit report output.
Recommendations
- AI detected serious security threats
Audit Metadata