generate-sparkle-appcast
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- CREDENTIALS_UNSAFE (MEDIUM): The skill requires access to
sparkle_private_key.txt, a sensitive Ed25519 private key used to sign software updates. Exposure or improper handling of this file could compromise the entire software supply chain. - COMMAND_EXECUTION (MEDIUM): The skill executes a local bash script (
.codex/skills/generate-sparkle-appcast/scripts/generate_appcast.sh). Since the script content is not provided, its safety cannot be fully verified, and it has the capability to perform arbitrary operations on the host. - PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection via git commit history and build artifact names. 1. Ingestion points: git commit logs, build directory file names. 2. Boundary markers: None. 3. Capability inventory: bash execution, file writes to
docs/andbuild/. 4. Sanitization: None provided.
Audit Metadata