intelligent-routing
Audited by Socket on Mar 1, 2026
1 alert found:
AnomalyThe intelligent-routing document describes a reasonable, useful pattern for automatically selecting specialist agents based on request classification. There is no direct evidence in the fragment of malware, obfuscated payloads, network endpoints, or hard-coded credentials. However, two design choices substantially increase security and privacy risk: (1) a 'Silent Analysis' directive that reduces transparency about internal decision-making and potential multi-agent activity, and (2) unconditional auto-invocation of other agents (including an orchestrator) without documented consent, context-forwarding constraints, or privilege limits. If the platform forwards sensitive context to invoked agents or if invoked agents have network/file/credential access, this design can enable transitive data exposure or unauthorized actions. Remediation: require explicit disclosure and user consent for multi-agent/state-changing/internet-capable operations, minimize context forwarding by default, add audit trails and permission scoping, and eliminate concealment wording.