NYC

dag-parallel-executor

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION] (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8) due to its core design as a task orchestrator. • Ingestion points: The skill ingests DAG schedules and node data from external skills like dag-task-scheduler in SKILL.md. • Boundary markers: Absent. The logic described in buildPromptForNode and buildParallelTaskCalls does not implement delimiters or instructions to prevent the sub-agent from following commands embedded in the task data. • Capability inventory: Significant capabilities including Task (agent spawning), Write, and Edit. Spawning sub-agents with Opus/Sonnet models creates a high-impact execution surface. • Sanitization: Absent. There is no validation or filtering of the content within task.nodeId or the prompts passed to the Task tool. • Impact: An attacker who can influence the DAG schedule can perform unauthorized actions by injecting instructions that the spawned sub-agents will execute.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 12:21 AM