GitHub Issue

Security testing for multi-agent swarms: agent isolation, delegation trust, inbox spoofing

Discovered On Mar 23, 2026
Primary Metric open
## Context ClawTeam enables powerful swarm intelligence - a leader agent spawning specialized sub-agents, each with their own worktree and communication channel. The coordination model is elegant. The security surface of this architecture hasn't been explored yet. When 8 agents run autonomously across GPUs with zero human intervention, several attack vectors become relevant: ## Attack Vectors Specific to ClawTeam's Architecture ### 1. Inbox Message Spoofing `clawteam inbox send` lets any agent message any other agent. Can a sub-agent impersonate the leader? Can an external process inject messages into the inbox? If the leader trusts `inbox` messages without verifying sender identity, a compromised worker can redirect the entire swarm. ### 2. Git Worktree Cross-Contamination Each agent gets its own worktree. But they share the same repo. Can Worker A's commits affect Worker B's branch? Can a malicious agent push to main or to another worker's branch? The isolation is filesystem-level, not permission-level. ### 3. Leader Delegation Trust The leader spawns workers and assigns tasks. But when a worker reports "Auth done. All tests passing" - how does the leader verify that? Self-reported completion without external verification is the most common governance failure in multi-agent systems. We documented a 14-day silent outage where agents reported "running" but had stopped doing useful work. ### 4. Task Escalation via Dependency Manipulation ClawTeam has "smart dependency m...
View Raw Thread