agent-tower-plugin
Warn
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill implements a recursive parent directory search for
.envfiles inscripts/lib/gemini_backend.py. This behavior can lead to the unintended ingestion of sensitive credentials from unrelated projects or the user's home directory if the plugin is executed from a nested folder. - [PROMPT_INJECTION]: The skill is highly susceptible to indirect prompt injection (Category 8) due to its multi-agent orchestration design.
- Ingestion points: User-provided tasks enter the system via the
--taskargument inrun_council.pyandrun_deliberate.py, and the--questionargument inrun_debate.py. - Boundary markers: The skill lacks robust boundary markers or 'ignore' instructions when interpolating the user task into agent prompts (e.g.,
OPINION_PROMPT,OPENING_ARGUMENT_PROMPT). - Capability inventory: The skill possesses the capability to execute arbitrary commands via the
claudeandcodexCLI backends and perform network operations via the Gemini API. - Sanitization: No sanitization or safety-filtering is performed on the input task beyond a 100KB length limit.
- [COMMAND_EXECUTION]: The skill frequently executes external CLI tools (
claude,codex) usingasyncio.create_subprocess_exec. While it uses the list-style invocation which protects against shell injection, it passes user-influenced prompts directly to these external AI agents which then execute code in their own environments.
Audit Metadata