parallel-web-search
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches an installation script from
https://parallel.ai/install.shand a Python packageparallel-web-toolsvia pipx. These resources are hosted on the vendor's own infrastructure. - [REMOTE_CODE_EXECUTION]: The setup instructions include a pattern where a remote script is downloaded and executed directly by the shell using
curl -fsSL https://parallel.ai/install.sh | bash. This is intended for the installation of the vendor's CLI tool. - [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to executeparallel-clifor search operations and to run shell commands for environment setup, includingpipx installandexportfor API key management. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes untrusted data from the web.
- Ingestion points: Data enters the context from the
parallel-cli searchcommand, which retrieves content from external websites (SKILL.md). - Boundary markers: Absent; there are no delimiters or instructions to the agent to disregard instructions potentially embedded within the search results.
- Capability inventory: The skill has access to the
Bashtool, which is used for CLI execution and file writing (SKILL.md). - Sanitization: The skill does not implement sanitization or validation of the search results before they are processed by the agent.
Recommendations
- HIGH: Downloads and executes remote code from: https://parallel.ai/install.sh - DO NOT USE without thorough review
Audit Metadata