developing-ios-apps

Fail

Audited by Gen Agent Trust Hub on Feb 24, 2026

Risk Level: CRITICALCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSSAFE
Full Analysis
  • [COMMAND_EXECUTION]: Persistent environment modification. The skill includes instructions to modify the global Git configuration using git config --global http.proxy, which affects all repositories on the system.
  • [COMMAND_EXECUTION]: Forceful process termination. The troubleshooting section suggests using pkill -9 Xcode to resolve issues with DerivedData, which aggressively terminates the application without allowing for clean-up or state saving.
  • [EXTERNAL_DOWNLOADS]: Fetching dependencies from well-known sources. The skill references external Swift Package Manager dependencies from GitHub repositories, including AudioKit and Realm. These are standard industry tools and the URLs target well-known open-source platforms.
  • [SAFE]: Automated scanner detection analysis. A scanner flagged com.app as a malicious URL. Analysis of the source code reveals that com.app is used exclusively as a string literal for a logger subsystem identifier (Logger(subsystem: "com.app", ...)). This is a standard reverse-DNS naming convention in iOS development and does not indicate network interaction with a malicious domain.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 24, 2026, 11:37 PM