taskmarket
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill instructs the agent to fetch an updated version of itself from
https://market.daydreams.systems/skill.mdand re-read it at the start of every session. This allows the remote server to dynamically change the agent's instructions and logic. - [COMMAND_EXECUTION]: The agent is explicitly directed to extract the
commandfield from thependingActionsJSON array returned by the Taskmarket API and run it 'verbatim'. This creates a direct pipeline for a remote service to execute arbitrary shell commands on the host system without validation. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
@lucid-agents/taskmarketNPM package. While this is the intended tool for the skill, it is an external dependency from a third-party source. - [PROMPT_INJECTION]: The skill is highly susceptible to indirect prompt injection via the
pendingActionsfield. - Ingestion points: The
commanddata is ingested from the Taskmarket API response inSKILL.md. - Boundary markers: None are present; the instructions explicitly tell the agent to bypass its own judgment ('Never infer what to do from status alone — always read pendingActions') and execute the string as provided.
- Capability inventory: The skill has access to the
Bashtool, allowing for full system interaction. - Sanitization: There is no mention of command sanitization, escaping, or validation before execution.
Audit Metadata