add-to-xcode

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [Privilege Escalation] (HIGH): The documentation suggests 'sudo gem install xcodeproj', which promotes unsafe administrative privilege escalation on the host system.
  • [Command Execution] (HIGH): The provided usage examples interpolate a '' directly into a shell command without escaping or sanitization, allowing for arbitrary command execution via maliciously named files (e.g., '$(touch exploit).swift'). Additionally, the 'Quick Reference' provides a complex shell pipeline involving command substitution to locate and execute its own scripts, which is an unsafe execution pattern.
  • [Indirect Prompt Injection] (HIGH): The skill ingests untrusted file paths from user-influenced agent tasks and processes them through shell commands and Ruby logic without adequate boundary markers or sanitization, exposing a high-risk capability (modifying Xcode build configurations) to malicious input.
  • [Unverifiable Dependencies] (MEDIUM): The skill relies on the 'xcodeproj' gem from an external registry (RubyGems) without version pinning or integrity checks, creating a supply chain risk.
  • [Prompt Injection] (LOW): The use of 'MANDATORY' and 'REQUIRED' instructions is designed to override agent reasoning to ensure specific script execution, mimicking behavior-overriding injection patterns.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 05:11 AM