schema0-cli
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of the
Bashtool to run theschema0CLI for tasks such as building applications, managing database migrations, and handling deployments. - [CREDENTIALS_UNSAFE]: The instructions guide the agent to handle and set sensitive credentials, such as database URLs and API keys, using the
schema0 secrets setcommand. This includes importing secrets from local.envfiles. - [DATA_EXFILTRATION]: The
schema0 synccommand is documented to transfer local repository data, including branches and history, to the Schema0 platform. Similarly, secrets are uploaded to the Schema0 backend. These operations are consistent with the skill's stated purpose of managing a remote deployment environment. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection as it processes untrusted data from the local environment (e.g., SQL migration statements in
version.mdand secret values insecrets.md) and interpolates them into CLI commands. - Ingestion points: CLI arguments such as
--statementsfor migrations andKEY=VALUEpairs for secrets, as well as the contents of.envfiles. - Boundary markers: The documentation recommends using single quotes for key-value pairs to prevent shell expansion.
- Capability inventory: The skill uses the
Bashtool to execute commands that can modify remote databases and application configurations. - Sanitization: Basic parsing for
.envfiles is mentioned, but the skill relies on the agent to correctly format shell arguments.
Audit Metadata