扫描报告
10 /100
claude-swarm
Claude-native multi-agent swarm orchestration for parallel coding via git worktrees and tmux
A legitimate multi-agent orchestration tool for spawning Claude Code agents in parallel via git worktrees and tmux, with properly documented capabilities. No malicious behavior, hidden exfiltration, or undocumented sensitive access observed.
可以安装
Verify that SWARM_WEBHOOK_URL and SWARM_TELEGRAM_BOT_TOKEN/SWARM_TELEGRAM_CHAT_ID point to trusted endpoints. Pin dependency versions in requirements.txt before auto-install. Consider documenting that spawned agents run with bypassPermissions.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Auto-install of unpinned dependencies 供应链 | scripts/spawn-agent.sh:95 |
| 低危 | bypassPermissions not explicitly declared in SKILL.md 文档欺骗 | scripts/spawn-agent.sh:125 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✓ 一致 | Spawns Claude Code agents via tmux with bypassPermissions — shell access is core… |
| 文件系统 | NONE | WRITE | ✓ 一致 | Creates worktrees, writes logs, writes runner scripts — all scoped to project di… |
| 网络访问 | READ | READ | ✓ 一致 | Webhook/Telegram POSTs only to user-configured SWARM_WEBHOOK_URL / SWARM_TELEGRA… |
| 环境变量 | NONE | READ | ✓ 一致 | Reads SWARM_* config vars from swarm.conf via 'source'; does not harvest keys br… |
1 项发现
中危 外部 URL 外部 URL
https://api.telegram.org/bot$ scripts/notify.sh:22 目录结构
10 文件 · 28.7 KB · 792 行 Shell 8f · 658L
Markdown 1f · 105L
JSON 1f · 29L
├─
▾
config
│ └─
duty-table.json
JSON
├─
▾
scripts
│ ├─
check-agents.sh
Shell
│ ├─
cleanup.sh
Shell
│ ├─
endorse-task.sh
Shell
│ ├─
integration-watcher.sh
Shell
│ ├─
notify-on-complete.sh
Shell
│ ├─
notify.sh
Shell
│ ├─
spawn-agent.sh
Shell
│ └─
spawn-batch.sh
Shell
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requirements.txt | unpinned | pip | 否 | Auto-installed without version pinning or hash verification |
安全亮点
✓ No base64 encoding, obfuscation, or anti-analysis techniques found
✓ No credential harvesting (API keys, SSH keys, .env scanning)
✓ No hardcoded external IPs or C2 communication patterns
✓ Webhook/Telegram calls are user-configured, not hardcoded
✓ Endorsement gate provides a manual safety check before agent spawning
✓ Agents run in isolated git worktrees with bounded scope
✓ All network calls are conditional and opt-in via config
✓ No cron jobs, backdoors, or persistence mechanisms
✓ Cleanup script properly removes worktrees and sessions
✓ Code is readable, self-contained shell scripts with no third-party dependencies