contacts
Fail
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
contacts_cli.shis vulnerable to AppleScript injection. User-supplied variables$NAME,$PHONE, and$EMAILare extracted from JSON input usingjqand directly interpolated into double-quoted strings withinosascriptblocks in thesearchandaddactions. Because there is no escaping or sanitization, an attacker can use a double quote to escape the string context and append malicious AppleScript commands, such asdo shell script, which provides full access to the underlying system shell. - [DATA_EXFILTRATION]: This skill accesses the macOS Contacts database, which contains sensitive personal information. The lack of input validation, combined with the command execution capability, creates a high risk that this data could be harvested and sent to an external server via an injected
curlorwgetcommand. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface (Category 8). 1. Ingestion points: The
name,phone, andemailparameters defined inSKILL.mdand processed bycontacts_cli.sh. 2. Boundary markers: Absent; the script does not use delimiters or instructions to ignore embedded commands in the data. 3. Capability inventory: Access to the macOS Contacts database and potential shell command execution through theosascriptinjection vulnerability. 4. Sanitization: Absent; the shell script performs no validation or escaping on the input before use.
Recommendations
- AI detected serious security threats
Audit Metadata