agent-zero-bridge
Warn
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure & Exfiltration (MEDIUM): The
a0_api.jsanda0_client.jsfiles implement a file attachment feature that reads arbitrary files from the local filesystem usingfs.readFileSyncand sends their base64-encoded content to the Agent Zero API. - Evidence:
scripts/lib/a0_api.jslines 86-98 iterate throughoptions.attachpaths provided via the CLI without validation or restriction, allowing an agent to be tricked into exfiltrating sensitive data like SSH keys or credentials. - Capability Exposure / Indirect Prompt Injection (LOW): The
clawdbot_client.jsandclawdbot_api.jsfacilitate a bidirectional bridge where Agent Zero can invoke tools on the host's Clawdbot gateway. - Evidence Chain (Category 8):
- Ingestion points:
clawdbot_client.jsaccepts command-line arguments and JSON payloads originating from the Agent Zero environment. - Boundary markers: Absent; instructions passed from Agent Zero are executed directly as tool calls.
- Capability inventory:
fs.readFileSync(file access),fs.writeFileSync(file creation intask_breakdown.js), andinvokeTool(Clawdbot gateway tools). - Sanitization: Filenames in
task_breakdown.jsare slugged to prevent basic path traversal, but tool arguments inclawdbot_client.jsare parsed directly from JSON strings.
Audit Metadata