peekaboo

Warn

Audited by Gen Agent Trust Hub on Mar 9, 2026

Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill requires the installation of the peekaboo binary from a third-party Homebrew tap (steipete/tap/peekaboo), which is not among the predefined trusted vendors.
  • [COMMAND_EXECUTION]: This skill wraps a CLI tool that performs high-privilege system operations including application management, window manipulation, and synthetic user input.
  • [DATA_EXFILTRATION]: The skill enables screen capture and clipboard access, allowing for the potential extraction of sensitive information displayed on the system or stored in the clipboard.
  • [PROMPT_INJECTION]: Commands such as see --analyze and image --analyze ingest visual data for processing by an LLM, creating an Indirect Prompt Injection surface. Ingestion points: UI screen content and element maps via the see and image commands (SKILL.md). Capability inventory: Subprocess calls via peekaboo for UI control, clicks, and typing. Sanitization: None identified.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 9, 2026, 09:12 PM