task-orchestrator
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill uses the
codexCLI with the--yoloflag to autonomously execute instructions derived from GitHub issues. This pattern allows for the execution of arbitrary code in a shell environment without user confirmation, which is dangerous if the source data (issue bodies) contains malicious content. - [COMMAND_EXECUTION]: The orchestrator uses
tmuxto manage background sessions and programmatically sends keyboard input usingsend-keys. It also automates file system and repository changes usinggit worktree,git push, and theghCLI for pull request management. - [PROMPT_INJECTION]: By fetching external issue descriptions and passing them into AI prompts (e.g., in the Codex execution command), the skill is vulnerable to indirect prompt injection. An attacker with access to the GitHub repository could craft an issue that hijacks the orchestration logic to perform unauthorized actions.
- [COMMAND_EXECUTION]: The skill establishes persistence by adding a heartbeat task to the system's cron scheduler. This recurring job automatically analyzes process status and executes self-healing commands, such as killing sessions or bypassing interactive prompts, which could be exploited to maintain unauthorized access or hide activity.
Audit Metadata