multi-codex-orchestrator
Audited by Socket on Apr 11, 2026
1 alert found:
AnomalyNo direct evidence of embedded malware (e.g., credential theft, exfiltration, backdoors) is visible in this bash snippet. The main security concerns are control-plane and integrity risks: (1) agent_id is used unsanitized as part of filesystem paths and git worktree targets, enabling potential directory traversal or workspace placement outside the intended run directory; (2) the sed rendering step interpolates untrusted values into Bash double-quoted sed scripts with escaping that may not cover all Bash-sensitive expansion characters, creating a risk of unintended pre-expansion; and (3) when --run is used, the generated task content is fed to an external automation tool, amplifying the impact of any malicious plan/template tampering. If plan.yaml and the template are fully trusted and not attacker-controlled, practical risk is lower; otherwise, this warrants hardening (strict validation of agent_id, safer templating approach, and stronger separation of control data from execution).