agent-creator
Warn
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The example script
notify-coordinator.shprovided inexamples/complete-agent-examples.mdis vulnerable to cross-session command injection. The script parses variables from a local markdown file usinggrepandsedand passes them totmux send-keys. Sincetmux send-keysinjects input directly into the target session's terminal, an attacker who can influence the content of the.claude/multi-agent-swarm.local.mdfile (e.g., through a malicious pull request or by compromising a data source analyzed by a worker) can execute arbitrary shell commands in the coordinator's tmux session. - [PROMPT_INJECTION]: The
swarm-workeragent template is vulnerable to indirect prompt injection. The agent is designed to read and follow instructions found in a local state file. If these instructions contain malicious prompts, the agent may execute unintended actions given its broad tool access includingBashandWritecapabilities. - Ingestion points:
.claude/multi-agent-swarm.local.md(read byswarm-worker.mdtemplate) - Boundary markers: Absent (no delimiters or instructions to ignore embedded commands provided in the template)
- Capability inventory:
Read,Write,Edit,Bash,Grep,Globin theswarm-worker.mdtemplate - Sanitization: Absent (the agent parses the markdown frontmatter and body directly without validation or escaping)
- [SAFE]: The skill provides credits to and derives its structure from the official 'anthropics/claude-code' repository documentation.
Audit Metadata