swarm
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [Unverifiable Dependencies & Remote Code Execution] (CRITICAL): Confirmed detection of piped remote execution. The installation instructions in
install.shand the project documentation promote the use ofcurl -fsSL https://raw.githubusercontent.com/clawdbot/node-scaling/main/install.sh | bash. This executes code from an untrusted repository (clawdbot) directly on the host machine, allowing for arbitrary code execution and full system compromise. - [COMMAND_EXECUTION] (HIGH): The skill's core functionality involves managing a background daemon and executing system-level commands via
bin/swarm.jsandbin/swarm-daemon.js. When combined with the unverified installation method, this provides a platform for persistent malicious activity. - [CREDENTIALS_UNSAFE] (MEDIUM): The
bin/setup.jswizard stores sensitive API keys for Google Gemini, OpenAI, and Anthropic in predictable plain-text files within~/.config/clawdbot/. Whilelib/security.jscontains logic to redact these keys from worker output, the local storage is insecure. - [Prompt Injection] (LOW): The
SKILL.mduses authoritative language ('MANDATORY', 'No exceptions') designed to override the agent's internal decision-making process and force the use of the Swarm tool for all parallel tasks. - [Indirect Prompt Injection] (LOW): The skill is designed to fetch and process untrusted external data from the web.
- Ingestion points:
lib/tools.js(fetches content from URLs) andlib/swarm-coordinator.js(aggregates findings from external sources). - Boundary markers: Present.
lib/security.jsprepends aSECURITY_POLICYto all LLM requests to instruct the model to treat content as data rather than instructions. - Capability inventory: System command execution, network access to model APIs, and hosting of a local HTTP server.
- Sanitization: Present.
lib/security.jsincludes functions to detect common injection patterns and redact sensitive credentials from worker responses.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/clawdbot/node-scaling/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata