device-testing
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill extensively uses
bunx xcobrato run commands.bunxdownloads and executes thexcobrapackage from the npm registry at runtime. This package is not from a trusted organization or repository listed in the security guidelines, making it an unverifiable dependency. - REMOTE_CODE_EXECUTION (MEDIUM): The command
bunx xcobra expo evalallows for the execution of arbitrary JavaScript strings within the context of a running Expo application. This dynamic execution capability (Category 10) can be used to access internal app state (e.g.,global.__REDUX_STORE__) or modify application logic. While functional for testing, it is a high-privilege operation. - COMMAND_EXECUTION (LOW): The skill utilizes several local system commands including
find,grep, andxcrun simctl. These are standard utilities used for their intended purpose of navigating the file system and managing iOS simulators. - DATA_EXFILTRATION (LOW): The skill has broad access to simulator data through commands like
sim screenshot,record-video,expo console, andexpo network. While it can capture UI state and network logs, there are no patterns suggesting the automated exfiltration of this data to an external server. - INDIRECT_PROMPT_INJECTION (LOW): The skill ingests untrusted data from the simulator's UI via
sim xml. An attacker-controlled application could potentially place malicious instructions in accessibility labels to influence the agent. - Ingestion points:
sim xml,expo console - Boundary markers: None present; data is piped directly to
grepor standard output. - Capability inventory:
expo eval(JS execution), shell command execution viabunx. - Sanitization: None detected; the agent is expected to parse raw XML and log output.
Audit Metadata