device-profile-management
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The PowerShell scripts
Initialize-DeviceProfile.ps1andSync-DeviceProfile.ps1dynamically execute local command-line utilities such aswinget,scoop,npm,choco,git,node,python, andclaudeto verify installation status and retrieve versions. - [COMMAND_EXECUTION]: The
Update-DeviceProfilefunction inSKILL.mdaccepts a script block as a parameter and executes it dynamically using the PowerShell call operator (&), representing a surface for dynamic code execution. - [DATA_EXFILTRATION]: The skill aggregates sensitive system information, such as OS version, CPU/RAM specifications, and full file system paths of installed applications. This data is written to a centralized 'Admin Root' directory intended for cloud synchronization (e.g., Dropbox or OneDrive), which moves local system metadata to external storage providers.
- [PROMPT_INJECTION]: The skill processes untrusted data from
profile.jsonand tool outputs. Ingestion points:profile.json(potentially synced from other devices) and tool version outputs. Capability inventory: File system writing, command execution via call operator, and system configuration querying via CIM. Sanitization: Absent. This creates a surface for indirect prompt injection where the agent might act upon data synchronized from external sources or captured from command outputs.
Audit Metadata