multi-agent-orchestrator
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: Path traversal vulnerability in session management. The SessionManager class and the results management script use unsanitized user-provided session IDs to construct file paths, which can be exploited to read or delete JSON files outside the intended directory.\n
- Evidence: In
lib/orchestrator.js, thegetSessionmethod usespath.join(SESSIONS_DIR,${sessionId}.json)without validatingsessionId. Inbin/orchestrator-results.js, the delete operation usespath.join(SESSIONS_DIR,${deleteId}.json)with the user-provideddeleteIddirectly.\n- [PROMPT_INJECTION]: Direct system prompt injection via context parameters. The orchestration engine appends user-controlled context data directly to the agent's system prompt, allowing for instruction override.\n - Evidence: The
executeTaskmethod inlib/orchestrator.jsappendscontext.languageandcontext.focusstrings directly to thesystemPromptvariable.\n- [DATA_EXFILTRATION]: Excessive file system access capabilities. The CLI tools allow the agent to read arbitrary local files, which could be combined with the network capabilities of the sub-agents to exfiltrate sensitive data.\n - Evidence: The
orchestrator-delegate.jsandorchestrator-parallel.jsscripts provide a--fileargument that reads content from any user-specified path usingreadFileSync.\n- [PROMPT_INJECTION]: Indirect prompt injection vulnerability. The skill processes untrusted input and task descriptions across multiple agents and aggregators without sanitization or boundary markers.\n - Ingestion points:
taskandinputparameters inlib/orchestrator.jsprocessed via sub-agents.\n - Boundary markers: Absent.\n
- Capability inventory: File system read/write/delete operations and network access to OpenAI and Anthropic APIs.\n
- Sanitization: Absent.
Audit Metadata