mole-mac-cleaner

Fail

Audited by Gen Agent Trust Hub on Mar 18, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The installation instructions provide multiple instances of downloading a shell script from an external GitHub repository (tw93/mole) and piping it directly into bash. This pattern allows for the execution of unverified code on the host system without prior inspection.
  • [COMMAND_EXECUTION]: The skill executes commands that perform destructive operations across the filesystem, including deleting application support files, caches, logs, and development artifacts (node_modules, build, etc.).
  • [COMMAND_EXECUTION]: The mo touchid command is used to modify system authentication configurations to enable Touch ID for sudo tasks, which involves altering high-privilege security settings.
  • [EXTERNAL_DOWNLOADS]: The skill initiates network requests to download binaries and scripts from external domains, specifically GitHub and Homebrew, which are required for the tool's functionality and updates.
Recommendations
  • HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/tw93/mole/main/install.sh - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 18, 2026, 09:25 AM