orchestrate
Audited by Socket on May 6, 2026
2 alerts found:
Anomalyx2This file does not show classic malware behaviors like exfiltration, crypto-mining, persistence backdoors, or network callbacks by itself. However, it is a high-impact orchestration/automation component that weakens safety controls (uses claude --permission-mode bypassPermissions) and performs autonomous keystroke-based approvals based on heuristic matching of terminal output. Because it acts on shared JSON state (including worktree_path/session_id) and injects constructed shell commands into tmux panes, a compromised or malicious state/poll-cycle output could coerce unintended command execution in the agent environment. The main security concern is integrity/control of the orchestration inputs and the safety of automated confirmation, not stealth malware.
This file is not obviously malicious by itself (no direct exfiltration, persistence mechanism, or classic backdoor payload), but it is security-relevant orchestration code. The biggest risks are (1) intentionally launching Claude with --permission-mode bypassPermissions (increasing impact if the agent is steered maliciously or if the execution context is abused) and (2) unsafe construction of the shell command injected into the tmux pane, where WORKTREE_PATH is embedded into a single-quoted cd command without robust escaping—creating a plausible automation/command injection risk if inputs can be influenced. Additionally, ORCHESTRATOR_STATE_FILE can redirect where persistent JSON metadata is written, which can be dangerous in broader attacker-controlled environments. Overall: treat as high-privilege operational control logic and harden input validation/escaping and state-file path handling.