distributed-task-orchestrator
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides multiple PowerShell and Bash script templates (e.g., in
references/cli-integration.mdandreferences/templates.md) that useStart-Job,RunspacePool, andGNU Parallelto execute system commands and launch sub-agents via theclaudeCLI tool. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted data from project files and interpolates it into prompts for sub-agents without sanitization or boundary markers.
- Ingestion points: Project files are read in
references/cli-integration.mdusingGet-Contentand passed to theclaudeCLI. - Boundary markers: No delimiters or instructions to ignore embedded commands are present in the prompt templates.
- Capability inventory: The skill has full capability to read/write files and execute shell commands through the orchestration scripts.
- Sanitization: No evidence of content validation or escaping is provided before data is sent to the CLI.
- [COMMAND_EXECUTION]: The skill generates executable
.ps1and.shscripts at runtime to initialize the orchestrator and run tasks, which is a form of dynamic script generation and execution.
Audit Metadata