parallel
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/parallel.shis vulnerable to command injection via shell expansion. Specifically, in therun_taskfunction, the variables$processorand$inputare placed inside a double-quoted string passed tocurl -d. Because Bash expands command substitutions like$(...)inside double quotes, an attacker-controlled query could execute arbitrary local commands on the user's system. - [CREDENTIALS_UNSAFE]: In
scripts/search.py, a hardcoded API key (y2s_m4er5i6-5qCikOLUtmnkvOYRU24eDphq_jg1) is used as a fallback value for thePARALLEL_API_KEYenvironment variable. Hardcoding secrets in source code is a major security risk as it can lead to credential theft and unauthorized API usage. - [EXTERNAL_DOWNLOADS]: The skill performs legitimate network operations to the vendor's API at
api.parallel.aiandapi.browser-use.com(for authenticated browsing features) to provide search and extraction services. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it retrieves and processes content from arbitrary external websites (Category 8).
- Ingestion points:
scripts/extract.py,scripts/search.py, andscripts/task.pyfetch external web content via the Parallel SDK. - Boundary markers: No delimiters or safety instructions are added to separate retrieved web data from the agent's instructions.
- Capability inventory: The skill includes local shell execution capabilities via
scripts/parallel.sh. - Sanitization: There is no evidence of sanitization or filtering applied to the retrieved content before it is returned to the agent context.
Recommendations
- AI detected serious security threats
Audit Metadata