扫描报告
20 /100
codex-swarm
OpenAI Codex-native multi-agent swarm orchestration for parallel coding with git worktrees, tmux tracking, endorsement gates, native code review, integration merging, and webhook notifications.
A legitimate OpenAI Codex multi-agent orchestration skill. Network access to Telegram and webhooks is used for notifications but is only partially declared in SKILL.md. No credential theft, data exfiltration, or obfuscation detected.
可以安装
Document the Telegram API integration explicitly in SKILL.md and remove or pin the optional config file sourcing pattern to avoid unexpected variable injection.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Telegram API integration not explicitly declared 文档欺骗 | scripts/notify.sh:22 |
| 低危 | Optional config sourcing not documented 文档欺骗 | scripts/notify.sh:8 |
| 提示 | Runner scripts written to logs directory with embedded prompt content 敏感访问 | scripts/spawn-agent.sh:82 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | WRITE | WRITE | ✓ 一致 | spawn-agent.sh:80-100 writes runner script; cleanup.sh kills tmux sessions |
| 文件系统 | WRITE | WRITE | ✓ 一致 | spawn-agent.sh:68-69 writes PROMPT_FILE to $SWARM_DIR/logs/ |
| 网络访问 | READ | WRITE | ✓ 一致 | notify.sh:22-27 uses curl POST to webhook URL and Telegram API — declared as 'we… |
| 环境变量 | NONE | READ | ✓ 一致 | notify.sh reads SWARM_TELEGRAM_BOT_TOKEN, SWARM_TELEGRAM_CHAT_ID, SWARM_WEBHOOK_… |
| 技能调用 | NONE | NONE | — | No skill_invoke calls detected |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser access |
| 数据库 | NONE | NONE | — | No database access |
1 项发现
中危 外部 URL 外部 URL
https://api.telegram.org/bot$ scripts/notify.sh:22 目录结构
10 文件 · 17.6 KB · 504 行 Shell 8f · 417L
Markdown 1f · 63L
JSON 1f · 24L
├─
▾
config
│ └─
duty-table.json
JSON
├─
▾
scripts
│ ├─
check-agents.sh
Shell
│ ├─
cleanup.sh
Shell
│ ├─
endorse-task.sh
Shell
│ ├─
integration-watcher.sh
Shell
│ ├─
notify-on-complete.sh
Shell
│ ├─
notify.sh
Shell
│ ├─
spawn-agent.sh
Shell
│ └─
spawn-batch.sh
Shell
└─
SKILL.md
Markdown
安全亮点
✓ Endorsement gate in spawn-agent.sh requires a pre-created approval file before spawning any agent, providing a manual safety check
✓ Cooldown mechanism (30s default) prevents rapid re-spawning of agents without re-endorsement
✓ All network calls are outbound notifications (POST to configured webhooks/Telegram) — no inbound C2 connections or unsolicited network behavior
✓ No base64, eval(), or obfuscated code patterns found across all 8 shell scripts
✓ No credential harvesting — SWARM_TELEGRAM_BOT_TOKEN is used only to send messages, not to exfiltrate tokens
✓ No access to ~/.ssh, ~/.aws, .env, or other sensitive credential paths
✓ No supply chain risk — no package dependencies, no pip/npm install, no remote script download
✓ Legitimate use of subprocess for git operations (worktree, branch, merge), tmux session management, and codex CLI invocation — all directly relevant to the stated multi-agent orchestration purpose