claude-code-notifications
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill adds a third-party Homebrew tap (
moltenbits/tap) and installs thegrowlrrrpackage from an unverified external repository. - [COMMAND_EXECUTION]: The skill executes
xattr -cr /Applications/growlrrr.app, which is a security bypass technique used to remove macOS quarantine flags. This allows unsigned or unverified applications to run without the standard security warnings or blocks from macOS Gatekeeper. - [REMOTE_CODE_EXECUTION]: The skill modifies the user's
~/.claude/settings.jsonfile to inject a command into theNotificationhook. This configuration ensures that a specific command is executed automatically by the agent environment whenever a notification event occurs. - [EXTERNAL_DOWNLOADS]: The skill uses
curlto download content from a user-provided URL to the/tmpdirectory, which could be leveraged to fetch arbitrary files into the local environment.
Recommendations
- AI detected serious security threats
Audit Metadata