ipsw
Pass
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [SAFE]: No malicious patterns, obfuscation, or security vulnerabilities were identified in the skill files. The instructions and references align perfectly with the stated purpose of Apple firmware and binary reverse engineering using the legitimate
ipswCLI tool. - [COMMAND_EXECUTION]: The skill documents the use of the
ipswcommand-line tool for various reverse engineering tasks, such as disassembling binaries, dumping Objective-C headers, and analyzing kernelcaches. These commands are intended for local execution by the agent or user within a controlled research environment. - [EXTERNAL_DOWNLOADS]: The skill includes instructions for downloading Apple firmware (IPSW/OTA) and related components from official sources like Apple's content delivery networks. These downloads are core to the tool's functionality and do not involve untrusted third-party scripts or remote code execution.
- [CREDENTIALS_UNSAFE]: No hardcoded credentials, API keys, or private tokens were found. The skill mentions a configuration file (
~/.ipsw/config.yml) for tool settings, which is a standard practice and does not expose sensitive information.
Audit Metadata