workflows
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- Indirect Prompt Injection (HIGH): The
overnight-build.mdandparallel-research.mdworkflows create high-risk attack surfaces where sub-agents ingest external/untrusted content. - Ingestion points:
parallel-research.mdreads competitor websites;overnight-build.mdreads project files likeSESSION_STATE.mdandBUILD-BRIEF.mdwhich may be modified by previous tasks or external processes. - Boundary markers: None. There are no instructions to the sub-agents to ignore instructions embedded within the data they are researching or building.
- Capability inventory: The sub-agents can write files, commit changes to git, and use the
messagetool to send files externally. - Sanitization: None detected.
- Data Exfiltration & Local File Access (MEDIUM): The
browser-pdf-generation.mdworkflow allows the browser to openfile://URLs. - Evidence: The example shows
file:///path/to/report.html. If an attacker-controlled URL is passed to this workflow (via Indirect Prompt Injection), an attacker could force the agent to capture screenshots or generate PDFs of sensitive system files (e.g.,file:///etc/passwdor~/.ssh/id_rsa). - Exfiltration path: The workflow explicitly includes a step to send the resulting file using
message send filePath=<pdf_path>. - Data Exposure (LOW): The
browser-mediavine-csv.mdfile contains hardcoded internal site IDs. - Evidence: Table mapping site names (e.g., 'Hello Hayley') to IDs (e.g., '16496'). While these are not secret keys, they provide internal metadata that could be used in reconnaissance or further attacks on the dashboards.
Recommendations
- AI detected serious security threats
Audit Metadata