desktop-automation
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
run_scriptfunction inrun.pyaccepts an unvalidatedscriptstring and executes it directly using theosascriptcommand viasubprocess.run. This provides an interface for executing arbitrary AppleScript code on the host system. - [COMMAND_EXECUTION]: The
open_appfunction inrun.pyperforms string interpolation of theappargument into an AppleScript template (f'tell application "{app}" to activate'). This is vulnerable to injection if the input contains escaping characters like double quotes. - [COMMAND_EXECUTION]: The skill provides the agent with the capability to manipulate any accessible application on the macOS desktop, which could lead to unauthorized data access or system changes if the agent's input is compromised.
Audit Metadata