parallel-web-extract
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The setup instructions in
SKILL.mdinclude a command to download and execute a shell script fromhttps://parallel.ai/install.shby piping it directly to bash. - [EXTERNAL_DOWNLOADS]: The skill instructions in
SKILL.mdrecommend installing theparallel-web-toolspackage viapipxfrom an external repository. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes content from untrusted external URLs.
- Ingestion points: Data from external URLs is ingested via the
parallel-cli extractcommand inSKILL.md. - Boundary markers: No delimiters or instructions are used in
SKILL.mdto distinguish between fetched data and agent instructions. - Capability inventory: The skill can execute commands via the
Bashtool and has network access, as specified inSKILL.md. - Sanitization: No sanitization or filtering of the extracted content is performed before it is presented to the agent.
Recommendations
- HIGH: Downloads and executes remote code from: https://parallel.ai/install.sh - DO NOT USE without thorough review
Audit Metadata