Convex Agents Workflows
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Prompt Injection] (HIGH): The skill is vulnerable to indirect prompt injection (Category 8) due to its data processing and execution capabilities.
- Ingestion points: The
promptandtopicarguments defined in thesimpleAgentFlowandresearchFlowhandlers inSKILL.md. - Boundary markers: Absent; untrusted inputs are directly interpolated into agent instructions (e.g.,
Research: ${topic}). - Capability inventory: The skill uses
step.runMutation(database write/state modification) andstep.runAction(LLM execution), meaning an injection can cause permanent data changes or external side effects. - Sanitization: No input validation, escaping, or delimiter usage is implemented.
- [External Downloads] (MEDIUM): The skill relies on external packages that are not from the predefined trusted source list.
- Evidence: Dependencies on
@convex-dev/agentand@convex-dev/workfloware referenced in the setup and workflow definition sections ofSKILL.md. - Risk: These packages originate from a non-whitelisted NPM organization, requiring additional manual verification of their security posture.
Recommendations
- AI detected serious security threats
Audit Metadata