axiom-tools
Pass
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill uses highly prescriptive and forceful language (e.g., "ABSOLUTELY MUST", "not negotiable", "not optional") and provides a table of "Red Flags" intended to override the agent's internal reasoning process. These patterns attempt to mandate the skill's workflow for all iOS/Swift-related tasks. Additionally, the skill introduces a surface for indirect prompt injection by ingesting and analyzing untrusted external data such as simulator console logs and crash reports.
- Ingestion points:
xclogcaptures simulator output;xcsymparses.ips,.crash, and.xccrashpointfiles. - Boundary markers: None specified for the output generated by the tools or the content of the analyzed files.
- Capability inventory: The skill executes
xclogandxcsymCLI tools and performs local file writes to.axiom/preferences.yamland.gitignore. - Sanitization: No explicit sanitization or escaping of ingested log/crash data is mentioned before it is processed by the agent.
- [COMMAND_EXECUTION]: The skill provides detailed instructions for the agent to execute local CLI tools (
xclogandxcsym) which are assumed to be distributed with the skill. These tools perform several operations that interact with the system and project files: - Process Management:
xclog launchterminates and restarts targeted iOS applications to capture console output. - File Discovery:
xcsymsearches for dSYM files across multiple locations, including~/Library/Developer/Xcode/Archives,~/Library/Developer/Xcode/DerivedData, and~/Downloads. - Project Modification: The skill instructs the agent to create a
.axiom/directory, write configuration topreferences.yaml, and automatically append entries to the project's.gitignorefile.
Audit Metadata