mole-mac-cleaner
Fail
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation instructions provide multiple instances of downloading a shell script from an external GitHub repository (
tw93/mole) and piping it directly intobash. This pattern allows for the execution of unverified code on the host system without prior inspection. - [COMMAND_EXECUTION]: The skill executes commands that perform destructive operations across the filesystem, including deleting application support files, caches, logs, and development artifacts (
node_modules,build, etc.). - [COMMAND_EXECUTION]: The
mo touchidcommand is used to modify system authentication configurations to enable Touch ID forsudotasks, which involves altering high-privilege security settings. - [EXTERNAL_DOWNLOADS]: The skill initiates network requests to download binaries and scripts from external domains, specifically GitHub and Homebrew, which are required for the tool's functionality and updates.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/tw93/mole/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata