generate-sparkle-appcast

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • CREDENTIALS_UNSAFE (MEDIUM): The skill requires access to sparkle_private_key.txt, a sensitive Ed25519 private key used to sign software updates. Exposure or improper handling of this file could compromise the entire software supply chain.
  • COMMAND_EXECUTION (MEDIUM): The skill executes a local bash script (.codex/skills/generate-sparkle-appcast/scripts/generate_appcast.sh). Since the script content is not provided, its safety cannot be fully verified, and it has the capability to perform arbitrary operations on the host.
  • PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection via git commit history and build artifact names. 1. Ingestion points: git commit logs, build directory file names. 2. Boundary markers: None. 3. Capability inventory: bash execution, file writes to docs/ and build/. 4. Sanitization: None provided.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 06:50 PM