blitz-app-smoke
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill automatically installs the 'blitz' package globally via
npm install -g blitzif it is not found on the system path. This installation is unpinned (no version specified) and occurs automatically during the 'prepare' phase. - [COMMAND_EXECUTION]: The
run.shscript executes various high-privilege Apple developer tools (xcodebuild,xcrun simctl) and theblitzCLI based on values parsed from a localcodex.blitz.tomlfile. - [REMOTE_CODE_EXECUTION]: The script uses
bash -lc "$install_cmd"to execute an installation command that can be overridden by the environment variableBLITZ_INSTALL_CMD. While this is an environment variable, the default behavior of automatically running an installer during a 'smoke test' increases the risk of executing arbitrary code if the registry or package is compromised. - [COMMAND_EXECUTION]: The
config_valueandresolver_config_valuefunctions inrun.shuseawkto parsecodex.blitz.toml. While it attempts to trim values, the extracted strings (likeproject_path,workspace_path, andscheme) are later interpolated into shell commands forxcodebuild. Maliciously crafted configuration files in a repository could lead to command injection if not properly sanitized.
Audit Metadata