cmux
Warn
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of the
cmux sendcommand inSKILL.mdto execute arbitrary shell commands across multiple terminal surfaces and workspaces. While intended for orchestration, this provides a powerful primitive for executing commands without direct user oversight in secondary panes. - [REMOTE_CODE_EXECUTION]: In
SKILL.md, the instructions specifically direct the agent to launch sub-Claude-Code instances using the--dangerously-skip-permissionsflag. This flag suppresses standard security prompts and authorization checks for the sub-agent's actions, creating a path for autonomous execution of potentially dangerous operations. - [DATA_EXFILTRATION]: The browser automation suite detailed in
references/browser.mdincludes commands for retrieving sensitive browser data. Specifically,cmux browser <surface> cookies getandcmux browser <surface> storage local|session getallow the agent to extract session identifiers and local storage data from active browser panes. - [DATA_EXFILTRATION]: The
cmux browser <surface> evalcommand allows for the execution of arbitrary JavaScript within the context of a web page. This can be used to exfiltrate DOM content, capture user input, or bypass client-side security controls. - [PROMPT_INJECTION]: The skill defines a large attack surface for indirect prompt injection. It instructs the agent to ingest untrusted data from external websites using commands like
snapshot --interactive,get text, andget html. - Ingestion points: Browser snapshots and HTML/text extraction in
references/browser.mdandSKILL.md. - Boundary markers: None identified in the provided instructions to differentiate between browser-sourced data and agent instructions.
- Capability inventory: Extensive subprocess execution via
cmux send, file system access via markdown previews, and network operations through the built-in browser. - Sanitization: No evidence of sanitization or filtering of data retrieved from the browser before it is processed by the agent.
Audit Metadata