vscode-claude-notify
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/notify-wsl.shis vulnerable to command injection. It interpolates the$TITLEand$MESSAGEshell variables directly into a PowerShell command string. An attacker providing a crafted message (e.g., containing single quotes or semicolons) could execute arbitrary PowerShell commands on the host Windows system. - Ingestion points: Command-line arguments
$1and$2inscripts/notify-wsl.sh. - Boundary markers: None; uses single quotes within the PowerShell string which are easily escapable.
- Capability inventory: Execution of
powershell.exevia WSL. - Sanitization: Absent.
- [COMMAND_EXECUTION]: The script
scripts/notify-mac.shcontains a similar injection surface where arguments are interpolated into anosascriptcommand string. This allows for AppleScript injection if the notification content is untrusted. - Ingestion points: Command-line arguments
$1and$2inscripts/notify-mac.sh. - Boundary markers: Double quotes are used but not escaped, allowing breakout.
- Capability inventory: Execution of
osascripton macOS. - Sanitization: Absent.
- [COMMAND_EXECUTION]: The suggested configuration in
references/hooks-config.mdandSKILL.mdfor Windows native environments uses the-ExecutionPolicy Bypassflag. While common for automation, this explicitly instructs the system to ignore local security policies regarding script execution.
Audit Metadata