developing-ios-apps
Fail
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSSAFE
Full Analysis
- [COMMAND_EXECUTION]: Persistent environment modification. The skill includes instructions to modify the global Git configuration using
git config --global http.proxy, which affects all repositories on the system. - [COMMAND_EXECUTION]: Forceful process termination. The troubleshooting section suggests using
pkill -9 Xcodeto resolve issues with DerivedData, which aggressively terminates the application without allowing for clean-up or state saving. - [EXTERNAL_DOWNLOADS]: Fetching dependencies from well-known sources. The skill references external Swift Package Manager dependencies from GitHub repositories, including AudioKit and Realm. These are standard industry tools and the URLs target well-known open-source platforms.
- [SAFE]: Automated scanner detection analysis. A scanner flagged
com.appas a malicious URL. Analysis of the source code reveals thatcom.appis used exclusively as a string literal for a logger subsystem identifier (Logger(subsystem: "com.app", ...)). This is a standard reverse-DNS naming convention in iOS development and does not indicate network interaction with a malicious domain.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata