skills/joelhooks/joelclaw/imsg-rpc/Gen Agent Trust Hub

imsg-rpc

Fail

Audited by Gen Agent Trust Hub on Feb 27, 2026

Risk Level: HIGHDATA_EXFILTRATIONCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
  • [DATA_EXFILTRATION]: The skill accesses '~/Library/Messages/chat.db', which contains the user's entire private iMessage history, presenting a significant privacy and data exposure risk.
  • [CREDENTIALS_UNSAFE]: Instructions for creating a local signing certificate use a hardcoded password ('imsg123') within the 'openssl' and 'security import' commands, which is a poor security practice for identity management.
  • [COMMAND_EXECUTION]: The skill performs sensitive system-level modifications, including using 'security add-trusted-cert' to add a self-signed certificate to the system's trusted root store, potentially compromising the integrity of the machine's certificate validation.
  • [COMMAND_EXECUTION]: The skill directs the user to grant Full Disk Access (FDA) to a custom binary via System Settings, which bypasses macOS's Transparency, Consent, and Control (TCC) security framework for that application.
  • [COMMAND_EXECUTION]: The skill relies on the execution of local shell scripts ('build-local.sh' and 'install-rpc-app.sh') whose contents are not defined within the skill and could execute unverified or dangerous code.
  • [COMMAND_EXECUTION]: The skill implements a persistence mechanism by installing a launchd agent ('~/Library/LaunchAgents/com.joel.imsg-rpc.plist') to ensure the daemon runs automatically across user sessions.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 27, 2026, 06:43 PM