skills/datadrivenconstruction/ddc_skills_for_ai_agents_in_construction/airflow-dag/Gen Agent Trust Hub
airflow-dag
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
ConstructionDAGBuilderclass inSKILL.mdutilizes string concatenation and f-strings to generate Python source code for Apache Airflow. The implementation of_generate_task_codedirectly interpolates user-controlled variables liketask_idandbash_commandinto the Python code without any escaping or sanitization. This allows a user to break out of string delimiters and inject arbitrary Python code or shell commands into the resulting DAG file, which would then be executed by the Airflow scheduler or worker. - [PROMPT_INJECTION]: The skill defines a surface for indirect prompt injection by processing user-provided data for code generation. Ingestion points include project data and parameters defined in
instructions.md. There is an absence of boundary markers or protective instructions when interpolating this untrusted data into the Airflow task templates. The skill's capability to write to the filesystem viasave_dagand generate executable content increases the risk. No sanitization or validation of the input is performed before it is embedded into the executable structure.
Audit Metadata