skills/mukul975/anthropic-cybersecurity-skills/exploiting-insecure-data-storage-in-mobile/Gen Agent Trust Hub
exploiting-insecure-data-storage-in-mobile
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizes thesubprocessmodule to execute system commands. - Evidence: It calls
adb pullto retrieve application data from a connected Android device for analysis. This is a primary function of the skill and is performed using a list-based argument structure which mitigates shell injection risks. - [DATA_EXFILTRATION]: The skill scans for sensitive data (credentials, tokens, PII) within mobile application storage directories.
- Evidence: Analysis of
scripts/agent.pyandscripts/process.pyshows that all data processing is performed locally on the auditor's machine. There are no network-based exfiltration patterns or requests to external domains found in the code. - [REMOTE_CODE_EXECUTION]: The skill mentions external tools like
Objection,Frida, andAndroid Backup Extractoras prerequisites. - Evidence: The skill does not include any automated download or installation scripts (such as
curl | bash) for these dependencies, requiring the user to provide them manually.
Audit Metadata