agent-worker
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
setupphase in YAML workflow definitions allows for the execution of arbitrary shell commands. Commands such asgit logorcat config.jsonare run with the user's privileges, which can be exploited to execute malicious system-level operations if a workflow configuration is untrusted. - [REMOTE_CODE_EXECUTION]: The skill supports dynamic tool loading through the
--toolCLI argument and YAMLtoolsdefinitions. This allows for the importation and execution of arbitrary TypeScript or JavaScript code from local files, providing a mechanism for unauthorized code execution. - [CREDENTIALS_UNSAFE]: The variable interpolation system allows environment variables (
${{ env.VAR }}) to be directly embedded into prompts and kickoff messages. This creates a risk of exposing sensitive secrets, such as API keys or access tokens, to the LLM backend or other agents in a multi-agent environment. - [DATA_EXFILTRATION]: The combination of shell command execution in the
setupphase and the ability to pass the resulting output to the LLM provides a direct path for reading sensitive local files and sending their contents to external model providers. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by design. 1. Ingestion points: Untrusted external data from shell outputs (e.g.,
git diff) and shared documents are ingested into the prompt context. 2. Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present during interpolation. 3. Capability inventory: The skill possesses significant system-level capabilities including shell access and file writing. 4. Sanitization: There is no evidence of validation or filtering of external content before it is interpolated into agent instructions. - [COMMAND_EXECUTION]: The
agent-worker schedulecommand facilitates the creation of periodic tasks via cron or interval schedules. While intended for monitoring, this capability could be abused to maintain persistent execution of malicious commands within the agent framework.
Recommendations
- AI detected serious security threats
Audit Metadata