karabiner
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill instructs the user to install 'GokuRakuJoudo' from an untrusted GitHub repository (yqrashawn/goku) using Homebrew. This source is not on the trusted organizations or repositories list.- COMMAND_EXECUTION (MEDIUM): The skill documentation provides explicit examples and templates for mapping keyboard shortcuts to arbitrary shell commands and AppleScript (e.g., 'open -a Safari', 'osascript'). This creates a significant execution surface on the host machine.- DATA_EXPOSURE (LOW): The skill manages and references local configuration files and logs in sensitive paths such as '
/.config/karabiner.edn' and '/Library/Logs/goku.log'.- INDIRECT_PROMPT_INJECTION (LOW): The skill creates an attack surface where a malicious configuration in 'karabiner.edn' could trigger dangerous shell commands. Evidence Chain: 1. Ingestion point: '~/.config/karabiner.edn'. 2. Boundary markers: Absent. 3. Capability inventory: Shell command execution and AppleScript execution. 4. Sanitization: Absent.
Audit Metadata