cli-anything-safari
Warn
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill operates by spawning fresh subprocesses for tool invocations, specifically executing commands through
npx safari-mcp. - [EXTERNAL_DOWNLOADS]: The skill is configured to automatically download and run the
safari-mcppackage from the npm registry upon its first use. - [REMOTE_CODE_EXECUTION]: Commands such as
tool evaluateandtool run-scriptallow the execution of arbitrary JavaScript code within the context of the active Safari browser page. - [DATA_EXFILTRATION]: The toolset includes capabilities to access sensitive information, including browser cookies (
get-cookies), local storage (local-storage), and the macOS system clipboard (clipboard-read). - [PROMPT_INJECTION]: As a browser automation harness, the skill has a significant attack surface for indirect prompt injection, where malicious instructions on a website could influence the agent's actions.
- Ingestion points: Processes external data from URLs via commands like
tool navigateandtool snapshot. - Boundary markers: The skill documentation references URL schema validation in
utils/security.pyto prevent access to dangerous protocols. - Capability inventory: Includes the ability to write files (
save-pdf), execute JavaScript (evaluate), and modify the system clipboard. - Sanitization: Implements validation to block dangerous schemes such as
file:,javascript:, anddata:, and can optionally block private network access.
Audit Metadata