claude-mobile-metro-manager
Pass
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
mcp__serena__execute_shell_commandto run local shell scripts (./scripts/start-metro.sh,./scripts/stop-metro.sh) and system utilities (pkill). While central to the skill's purpose, executing shell commands based on predefined scripts carries inherent risk if those scripts are modified.- [DATA_EXFILTRATION]: The skill reveals sensitive information about the host environment by hardcoding an absolute file path:/Users/nick/Desktop/claude-mobile-expo. This exposes the username and local directory structure to the agent context.- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface. It reads untrusted data fromlogs/metro.logviamcp__morphllm__read_fileto verify server status. Because log files can contain arbitrary output from applications or third-party dependencies, an attacker could inject instructions into the logs that the agent might interpret as commands. Evidence: - Ingestion points:
logs/metro.log(referenced in SKILL.md) - Boundary markers: None defined; the agent is instructed to read the first 100 lines and check for specific strings.
- Capability inventory:
mcp__serena__execute_shell_command(referenced in SKILL.md) - Sanitization: None present; the agent processes raw file content.
Audit Metadata