dag-parallel-executor
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION] (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8) due to its core design as a task orchestrator. • Ingestion points: The skill ingests DAG schedules and node data from external skills like
dag-task-schedulerinSKILL.md. • Boundary markers: Absent. The logic described inbuildPromptForNodeandbuildParallelTaskCallsdoes not implement delimiters or instructions to prevent the sub-agent from following commands embedded in the task data. • Capability inventory: Significant capabilities includingTask(agent spawning),Write, andEdit. Spawning sub-agents with Opus/Sonnet models creates a high-impact execution surface. • Sanitization: Absent. There is no validation or filtering of the content withintask.nodeIdor the prompts passed to theTasktool. • Impact: An attacker who can influence the DAG schedule can perform unauthorized actions by injecting instructions that the spawned sub-agents will execute.
Recommendations
- AI detected serious security threats
Audit Metadata