iterative-fleet
Pass
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill implements an indirect prompt injection surface within the generated
orchestrator.shscript. Thebuild_iter_promptfunction reads feedback fromiterations/<N>/review.md(written by a reviewer agent) and appends it verbatim to the builder agent's prompt for the subsequent iteration. If the reviewer is influenced by malicious data in logs or output, those instructions could be executed by the builder in the next cycle. - Ingestion points:
orchestrator.shreads feedback fromreview.mdfiles generated during iterations. - Boundary markers: Uses markdown headers (e.g., '# Reviewer Feedback') and horizontal rules (
---) to separate feedback. - Capability inventory: Workers are granted varying levels of
Bash,Edit,Write, andAgenttool access depending on their assigned type (code-run,write,research). - Sanitization: None; content from the reviewer's verdict file is appended directly to the prompt.
- [COMMAND_EXECUTION]: The skill uses
launch.shandworker-spawn.shto dynamically generate bash scripts (orchestrator.shand.worker-cmd-*.sh) and executes them viatmux. While the skill includes input validation viavalidate_fleet_idandvalidate_safe_idto prevent traditional shell injection, the runtime assembly and execution of code is a sensitive behavior.
Audit Metadata