ios-device-screenshot

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • Privilege Escalation (HIGH): The skill explicitly instructs users to execute commands with sudo to start the tunneld daemon, which is required for iOS 17+ device communication. Providing root access to external tools is a high-risk operation.
  • Evidence in SKILL.md: sudo pymobiledevice3 remote tunneld used in both setup instructions and the provided integration script.
  • Command Execution (MEDIUM): The skill executes multiple local system utilities and third-party tools to list devices, mount images, and capture data.
  • Evidence in SKILL.md: Usage of xcrun devicectl, ideviceinfo, ideviceimagemounter, and pymobiledevice3.
  • Unverifiable Dependencies (LOW): The skill depends on pymobiledevice3, an external open-source project. While widely used in the security community, it is downloaded from public registries (PyPI) at runtime.
  • Evidence in SKILL.md: uv tool install pymobiledevice3 or pipx install pymobiledevice3.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 05:13 PM