create-beads-orchestration

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [Remote Code Execution] (HIGH): The skill clones a repository from https://github.com/AvivK5498/Claude-Code-Beads-Orchestration and immediately executes a Python script (bootstrap.py) contained within it. This source is not within the trusted repository scope, posing a risk of arbitrary code execution.
  • [External Downloads] (HIGH): The skill downloads code in Step 2 (git clone) and 'specialist agents' in Step 4 from external sources without integrity verification or version pinning.
  • [Command Execution] (HIGH): The bootstrap script is designed to install software using system package managers (brew, npm, go) and modify core configuration files such as .claude/settings.json.
  • [Indirect Prompt Injection] (HIGH): The discovery agent in Step 4 processes data from untrusted project files to generate and write new agent definitions to .claude/agents/. 1. Ingestion points: Project files (package.json, requirements.txt, Dockerfile) and an 'external directory' of specialist agents. 2. Boundary markers: Absent; there are no delimiters or instructions to ignore embedded commands in the processed data. 3. Capability inventory: The skill can write files to the .claude/agents/ and .claude/hooks/ directories and execute shell commands via Python. 4. Sanitization: Absent; the skill does not specify any validation or filtering of the content ingested from the project files before using it to define agent behaviors.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 06:27 AM