multi-agent-architecture
Fail
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The configuration templates for both the
newsandcodeagents inSKILL.mdexplicitly include theexectool in theirtools.allowconfiguration. This grants these agents the ability to execute shell commands directly on the environment where the agent is running. - [REMOTE_CODE_EXECUTION]: The
News Agentconfiguration pairs theweb_fetchcapability (fetching content from arbitrary URLs) with theexectool. This pattern is highly susceptible to indirect prompt injection, where a malicious website could provide instructions that the agent then translates into executable commands. - [DATA_EXFILTRATION]: The
Code Agentis grantedread,write, andeditcapabilities. When combined with its ability to communicate via themessagetool or spawn new sessions, this architecture facilitates the unauthorized reading and transmission of sensitive local files. - [PROMPT_INJECTION]: The 'Intelligent Spawn' system relies on the Main Agent to parse user-supplied task descriptions and route them to sub-agents. This design lacks robust boundary markers, allowing a user to potentially inject instructions that bypass intended restrictions or trick the system into routing a malicious payload to an agent with high-privilege tools like
exec. - Ingestion points: External web content via
web_fetchin thenewsagent; user-provided task strings insessions_spawncalls withinSKILL.mdexamples. - Boundary markers: No boundary markers or 'ignore' instructions are present in the system prompt examples or configuration files.
- Capability inventory:
exec,read,write,edit,web_fetch, andmessagetools distributed across various agent configurations. - Sanitization: The skill lacks any documentation or implementation of input sanitization or validation before passing data to the
execorsessions_spawnfunctions.
Recommendations
- AI detected serious security threats
Audit Metadata