parallel-web

Fail

Audited by Gen Agent Trust Hub on Apr 14, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The setup instructions direct the user to install a CLI tool by piping a script from 'https://parallel.ai/install.sh' directly into bash. This is a high-risk command execution pattern that bypasses integrity verification and executes remote code with user privileges.
  • [CREDENTIALS_UNSAFE]: The skill instructs the agent to access and load a local '.env' file to authenticate the 'parallel-cli' tool. Accessing sensitive files like '.env' which contain private API keys poses a risk of credential exposure if the data is mishandled or leaked into the agent's context.
  • [COMMAND_EXECUTION]: The skill relies on multiple shell commands (parallel-cli, dotenv, uv, pip) to perform its functions. User-supplied arguments such as URLs and search queries are passed to these commands, creating a potential risk for command injection if the inputs are not strictly validated by the underlying tool.
  • [EXTERNAL_DOWNLOADS]: The skill downloads and installs several external dependencies and scripts from remote sources, including 'parallel-web-tools' and 'python-dotenv'. These downloads occur from non-standard repositories, introducing supply chain risks.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its core function of fetching and processing untrusted content from the web.
  • Ingestion points: Web search results and extracted page content from arbitrary URLs are read into the agent's context via stdout and files.
  • Boundary markers: There are no explicit delimiters or instructions provided to help the agent distinguish between its own instructions and the content retrieved from external sources.
  • Capability inventory: The skill has access to subprocess execution via 'parallel-cli' for search, extraction, and research tasks.
  • Sanitization: No sanitization or filtering logic is mentioned for the fetched content before it is processed by the agent.
Recommendations
  • HIGH: Downloads and executes remote code from: https://parallel.ai/install.sh - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 14, 2026, 11:55 AM