macos-admin
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill requires elevated privileges via
sudo, granting the agent full administrative control over the host macOS system.\n- [COMMAND_EXECUTION]: It provides instructions for modifying or disabling critical security features, including System Integrity Protection (SIP) viacsrutiland Gatekeeper policies viaspctl.\n- [COMMAND_EXECUTION]: The skill enables comprehensive user and group management through thedsclutility, which could be leveraged for unauthorized account creation or privilege modification.\n- [CREDENTIALS_UNSAFE]: The documentation suggests passing administrative passwords via environment variables and command-line flags (e.g., infdesetup), which risks exposing secrets in process lists, system logs, or shell history.\n- [COMMAND_EXECUTION]: It encourages the use ofos.system,os.popen, and AppleScript viaosascriptfor executing commands, which increases the attack surface and potential for command injection.\n- [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection. Ingestion point: Reads system logs vialog showwhich can contain untrusted data. Boundary markers: None mentioned. Capability inventory: High-privilege tools includingsudo,dscl, andfdesetup. Sanitization: No sanitization or validation of log content is specified before processing.
Recommendations
- AI detected serious security threats
Audit Metadata