orchestrate
Fail
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses extensive shell command execution via subprocesses. Most significantly,
_shared/tools/dependency-utils.shincludes helper functions to install system packages usingsudo apt-get install, as well asbrew,apk, andyum, acquiring elevated permissions. - [EXTERNAL_DOWNLOADS]: The files
_cli/cli/dependencies.pyand_shared/tools/yaml_compat.pycontain logic to automatically fetch and install Python packages from official registries if they are not detected at runtime. - [REMOTE_CODE_EXECUTION]: The orchestration engine in
_cli/cli/orchestrator/agent_caller.pyinvokes theclaudeCLI usingsubprocess.runto execute tasks and process the resulting output dynamically. - [DATA_EXFILTRATION]: The framework implements a comprehensive logging system via shell and Python hooks in
_shared/tools/hooks/and_scripts/hooks/. These hooks intercept and write all tool inputs and outputs to local JSONL files, creating a significant data exposure risk for any secrets or private code handled during the session. - [PROMPT_INJECTION]: The skill's design involves reading project files and interpolating their contents into sub-agent prompts via
_cli/cli/orchestrator/stage_runner.py. This architecture is vulnerable to indirect prompt injection, where malicious content in a local file could manipulate the orchestrator's decision-making logic.
Recommendations
- AI detected serious security threats
Audit Metadata