autoresearch-fleet
Warn
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
launch.shscript generates anorchestrator.shscript that executes a sub-agent (claude,codex, orpi) usingbash -c. This sub-agent is granted significant autonomy to manage a project codebase.- [REMOTE_CODE_EXECUTION]: The orchestrator instructs the sub-agent to execute an arbitraryeval_commandprovided in thefleet.jsonconfiguration file. When using the Claude provider, the sub-agent is launched with the--dangerously-skip-permissionsflag, which bypasses the user confirmation requirement for tool usage. This allows the agent to execute shell commands and modify files silently.- [PROMPT_INJECTION]: The skill uses "NEVER STOP" and "LOOP FOREVER" directives in its core instructions (program.md) and the generated orchestrator prompt. These instructions are intended to override default AI behavior regarding task completion and safety-related termination.- [INDIRECT_PROMPT_INJECTION]: The autonomous loop creates an indirect prompt injection surface by having the agent read its own history fromresults.tsvat the start of every iteration. Because the agent also writes experiment descriptions to this file, an attacker who can influence the code being optimized or its output could inject instructions that the agent would follow in subsequent iterations. - Ingestion points: The
results.tsvfile is read by the agent in each iteration (referenced inorchestrator.shandprogram.md). - Boundary markers: Absent. The agent is instructed to read the file for context on prior experiments without any delimiters or "ignore instructions" warnings.
- Capability inventory: The spawned sub-agent has access to
Bash,Edit,Write, andWebSearchtools (as defined inlib/worker-spawn.shandlib/tools.sh), and is explicitly given permission to use them without user confirmation. - Sanitization: Absent. Data from the experiment log is incorporated directly into the agent's context in every loop.
Audit Metadata