multi-agent-orchestration
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is highly vulnerable to injection because untrusted data is directly interpolated into prompts. \n
- Ingestion points: The
taskparameter inSupervisor.run()andmulti_agent_analysis(), and agent outputs insynthesize_findings()andresolve_conflicts(). \n - Boundary markers: None. Prompts lack delimiters or 'ignore embedded instructions' warnings. \n
- Capability inventory: The skill can route work to specialized agents and spawn new agent sessions using the 'Agent Teams' pattern (CC 2.1.33+). \n
- Sanitization: No validation or escaping is applied to untrusted content before prompt construction. \n- Command Execution (HIGH): Through the 'Agent Teams' functionality, the skill allows spawning new full-capability agent sessions via the
Tasktool. If the routing logic is compromised via prompt injection, an attacker can manipulate the prompts or task descriptions of these sub-agents to execute unauthorized commands or exfiltrate data. \n- Conditional Attacks (MEDIUM): The skill contains logic gated by environment variables (CLAUDE_CODE_EXPERIMENTAL_AGENT_TEAMS,ORCHESTKIT_PREFER_TEAMS) which activates the higher-privilege agent-spawning capabilities.
Recommendations
- AI detected serious security threats
Audit Metadata