parallel-batch-executor
Fail
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Vulnerable parallel execution patterns in
SKILL.md. The implementation usesxargs -I {} -P "$PARALLEL" bash -c "..."which performs simple string replacement of the{}placeholder with input data. If the input items (from files or JSON arrays) contain shell metacharacters like backticks, semicolons, or dollar signs, they will be interpreted and executed by the shell sub-process. - [COMMAND_EXECUTION]: Unsafe command invocation in
batch_repo_commandandparallel_with_errors. These functions accept arbitrary command strings and execute them within a bash subshell across various directories or items without any validation or sanitization of the command or the arguments, facilitating high-risk operations across the file system. - [COMMAND_EXECUTION]: Indirect prompt injection surface via untrusted JSON data. The skill ingest points include
stdinforjqandcat(processingtasks.jsonoritems.txt). There are no boundary markers or sanitization logic, and the skill possesses high capabilities includingbash -c,xargs, andfind, which can be exploited by embedding malicious instructions in the processed data.
Recommendations
- AI detected serious security threats
Audit Metadata