volume
Warn
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The bash script 'volume_cli.sh' is vulnerable to command injection through the 'level' parameter. The script extracts the value using 'jq' and interpolates it directly into an AppleScript command string: 'osascript -e "set volume output volume $LEVEL"'. Because the script does not verify that the level variable is a numeric value, an attacker could craft a payload (for example, using AppleScript's 'do shell script') to execute arbitrary commands on the host system. Although the metadata in 'SKILL.md' defines the parameter as a number, the underlying script lacks the necessary validation to prevent exploitation if the agent platform or the model bypasses the type constraint during execution.
Audit Metadata