ClawTeam Multi-Agent Coordination
Fail
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires the installation of an external package from PyPI:
pip install clawteam. This introduces a third-party dependency into the environment.\n- [COMMAND_EXECUTION]: Theclawteam spawncommand is used to launch sub-processes (defaulting to theclaudeCLI agent). This allows the skill to execute and manage external programs dynamically.\n- [REMOTE_CODE_EXECUTION]: The skill documentation explicitly instructs users and agents to use the--dangerously-skip-permissionsflag during thespawnprocess. This instruction is designed to bypass standard tool-use confirmation and safety guardrails for sub-agents, allowing them to perform potentially dangerous operations autonomously without human oversight.\n- [PROMPT_INJECTION]: The skill implements an inter-agent messaging system (clawteam inbox) which acts as a vector for indirect prompt injection (Category 8). \n * Ingestion points: Data enters the agent context viaclawteam inbox receive(found inSKILL.mdandreferences/workflows.md). \n * Boundary markers: None identified; messages from other agents are processed as plain-text instructions. \n * Capability inventory: The skill allows spawning sub-processes, writing files to~/.clawteam/, and executing CLI tools. \n * Sanitization: No evidence of input validation or escaping for incoming messages.
Recommendations
- AI detected serious security threats
Audit Metadata