celery-advanced
Warn
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: MEDIUMPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- PROMPT_INJECTION (MEDIUM): An indirect prompt injection surface exists in
references/canvas-workflows.mdwhere untrusted data is processed through pipelines with critical capabilities.\n - Ingestion point:
extract_dataandtransform_datatasks receiving external IDs and raw data.\n - Boundary markers: None defined in the pattern samples.\n
- Capability inventory:
write_to_destination,process_payment, andalert_team.\n - Sanitization: Includes
apply_schemavalidation, which is a recommended but incomplete mitigation against adversarial input.\n- EXTERNAL_DOWNLOADS (LOW): Documentation recommends installing common packages such asdjango-celery-beatandflowerfrom trusted registries.\n- COMMAND_EXECUTION (LOW): Use of Redis Lua scripting inreferences/rate-limiting-patterns.mdfor atomic token bucket operations. This logic is statically defined and does not incorporate untrusted external input.
Audit Metadata