Scan Report
10 /100
claude-swarm
Claude-native multi-agent swarm orchestration for parallel coding via git worktrees and tmux
A legitimate multi-agent orchestration tool for spawning Claude Code agents in parallel via git worktrees and tmux, with properly documented capabilities. No malicious behavior, hidden exfiltration, or undocumented sensitive access observed.
Safe to install
Verify that SWARM_WEBHOOK_URL and SWARM_TELEGRAM_BOT_TOKEN/SWARM_TELEGRAM_CHAT_ID point to trusted endpoints. Pin dependency versions in requirements.txt before auto-install. Consider documenting that spawned agents run with bypassPermissions.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | Auto-install of unpinned dependencies Supply Chain | scripts/spawn-agent.sh:95 |
| Low | bypassPermissions not explicitly declared in SKILL.md Doc Mismatch | scripts/spawn-agent.sh:125 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | NONE | WRITE | ✓ Aligned | Spawns Claude Code agents via tmux with bypassPermissions — shell access is core… |
| Filesystem | NONE | WRITE | ✓ Aligned | Creates worktrees, writes logs, writes runner scripts — all scoped to project di… |
| Network | READ | READ | ✓ Aligned | Webhook/Telegram POSTs only to user-configured SWARM_WEBHOOK_URL / SWARM_TELEGRA… |
| Environment | NONE | READ | ✓ Aligned | Reads SWARM_* config vars from swarm.conf via 'source'; does not harvest keys br… |
1 findings
Medium External URL 外部 URL
https://api.telegram.org/bot$ scripts/notify.sh:22 File Tree
10 files · 28.7 KB · 792 lines Shell 8f · 658L
Markdown 1f · 105L
JSON 1f · 29L
├─
▾
config
│ └─
duty-table.json
JSON
├─
▾
scripts
│ ├─
check-agents.sh
Shell
│ ├─
cleanup.sh
Shell
│ ├─
endorse-task.sh
Shell
│ ├─
integration-watcher.sh
Shell
│ ├─
notify-on-complete.sh
Shell
│ ├─
notify.sh
Shell
│ ├─
spawn-agent.sh
Shell
│ └─
spawn-batch.sh
Shell
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requirements.txt | unpinned | pip | No | Auto-installed without version pinning or hash verification |
Security Positives
✓ No base64 encoding, obfuscation, or anti-analysis techniques found
✓ No credential harvesting (API keys, SSH keys, .env scanning)
✓ No hardcoded external IPs or C2 communication patterns
✓ Webhook/Telegram calls are user-configured, not hardcoded
✓ Endorsement gate provides a manual safety check before agent spawning
✓ Agents run in isolated git worktrees with bounded scope
✓ All network calls are conditional and opt-in via config
✓ No cron jobs, backdoors, or persistence mechanisms
✓ Cleanup script properly removes worktrees and sessions
✓ Code is readable, self-contained shell scripts with no third-party dependencies