iterative-fleet
Warn
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/launch.shscript dynamically generates theorchestrator.shscript at runtime using an unquoted heredoc (<<ORCH_EOF). This allows variables extracted from the user-controlledfleet.jsonfile (such asfleet_name) to be expanded during generation, which can lead to shell command injection when the orchestrator is executed. - [COMMAND_EXECUTION]: The
lib/worker-spawn.shscript constructs shell commands by concatenating strings with configuration variables (e.g.,worker_id,session_name,cwd). These variables are wrapped in single quotes, but can still be escaped if the input contains single quotes, leading to arbitrary command execution when passed tobash -cortmux. - [COMMAND_EXECUTION]: The
scripts/kill.shscript usespgrep -fwith theFLEET_ROOTpath to identify and terminate processes. If the root path is manipulated or overly broad, this could inadvertently target unrelated system processes. - [PROMPT_INJECTION]: The skill configures spawned Claude workers using the
--dangerously-skip-permissionsflag. This bypasses standard user confirmation prompts for tool execution, allowing the automated workers to perform file and system operations without manual oversight.
Audit Metadata