database-testing
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
child_process.execSyncto perform database operations like migrations and schema dumping. - Evidence: The
getSchemaSnapshotfunction inSKILL.mdinterpolates the${dbUrl}variable directly into apg_dumpcommand string. If this URL is sourced from untrusted project configuration, it presents a command injection vulnerability. - [EXTERNAL_DOWNLOADS]: The skill frequently references
npx(e.g.,npx prisma migrate), which can result in the dynamic download and execution of packages from the public npm registry at runtime. - [PROMPT_INJECTION]: The skill is designed to ingest untrusted data from an external file, creating a surface for indirect prompt injection.
- Ingestion points: The skill explicitly instructs the agent to check
.agents/qa-project-context.mdfor database and environment configuration in the<objective>section. - Boundary markers: Absent. There are no instructions to the agent to treat the contents of the context file as untrusted or to ignore embedded instructions.
- Capability inventory: The skill has extensive capabilities including shell command execution (
execSync) and full database query access via thepgpool. - Sanitization: Absent. The provided examples show direct use of configuration data in shell commands and database queries without validation or escaping.
Audit Metadata