multi-codex-orchestrator

Warn

Audited by Socket on Apr 11, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/spawn_agents.sh

No direct evidence of embedded malware (e.g., credential theft, exfiltration, backdoors) is visible in this bash snippet. The main security concerns are control-plane and integrity risks: (1) agent_id is used unsanitized as part of filesystem paths and git worktree targets, enabling potential directory traversal or workspace placement outside the intended run directory; (2) the sed rendering step interpolates untrusted values into Bash double-quoted sed scripts with escaping that may not cover all Bash-sensitive expansion characters, creating a risk of unintended pre-expansion; and (3) when --run is used, the generated task content is fed to an external automation tool, amplifying the impact of any malicious plan/template tampering. If plan.yaml and the template are fully trusted and not attacker-controlled, practical risk is lower; otherwise, this warrants hardening (strict validation of agent_id, safer templating approach, and stronger separation of control data from execution).

Confidence: 62%Severity: 67%
Audit Metadata
Analyzed At
Apr 11, 2026, 04:06 AM
Package URL
pkg:socket/skills-sh/flc1125%2Fskills%2Fmulti-codex-orchestrator%2F@5cd131b475c6442ec87874d4b7a083ffa2741b04