beads
Warn
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The
beads-worker.mdagent is vulnerable to indirect prompt injection. It retrieves task titles, descriptions, and labels from the repository using thebdCLI. Because this data is stored in version-controlled JSONL files, an attacker with repository access can inject malicious instructions that the worker agent will then follow during its automated execution loop. - Ingestion points: Task data is ingested from
.beads/tasks.jsonland.beads/comments.jsonlvia thebd ready --jsonandbd show --jsoncommands. - Boundary markers: None. The agent is instructed to directly execute work based on the 'Execute Work' matching patterns applied to task metadata.
- Capability inventory: The worker agent has access to
Bash,Read,Write,Edit, andTasktools, allowing for extensive system manipulation. - Sanitization: The skill lacks any mechanism to sanitize or validate external task content before it is processed by the AI.
- [COMMAND_EXECUTION]: The skill frequently uses the
Bashtool to interact with the file system, git repository, and thebdbinary. Additionally, the worker agent uses theTasktool to spawn sub-tasks based on issue descriptions found in the tracker. - [EXTERNAL_DOWNLOADS]: The skill documentation recommends installing the
beadstool from the official Anthropic NPM registry and from an external GitHub repository. - [REMOTE_CODE_EXECUTION]: The worker agent in
agents/beads-worker.mdis instructed to dynamically activate skills based onskill:labels found in task JSON. This creates a mechanism where untrusted external data (labels in a task) directly controls which toolsets and instruction contexts are loaded into the agent's session, which could be abused to load skills with dangerous capabilities.
Audit Metadata