android-emulator-skill
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill exposes the agent to untrusted data from the Android device, which could contain malicious instructions.\n
- Ingestion points:
scripts/app_state_capture.pyreads UI hierarchies and system logs from the connected device.\n - Boundary markers: Absent. No specific delimiters or safety instructions are wrapped around the device data.\n
- Capability inventory: Full ADB access and local Gradle build execution.\n
- Sanitization: No sanitization is performed on data retrieved from the device before it is processed by the agent.\n- Command Execution (SAFE): The skill executes
adb,emulator, andgradlewto perform its tasks. These calls are made usingsubprocess.runwith structured argument lists, minimizing shell injection risks on the host machine.\n- Privilege Escalation (SAFE): Thescripts/build_and_test.pyscript applieschmod 0o755to thegradlewbinary within the project directory. This is a standard and expected operation for Android build automation.
Audit Metadata