screenshot
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes platform-specific binaries and local scripts (Python, PowerShell, Swift, Bash) to capture screen data, which is a required capability for its primary purpose.
- [COMMAND_EXECUTION]: The Windows PowerShell script ('scripts/take_screenshot.ps1') utilizes 'Add-Type' to compile C# code at runtime for Win32 API access, and the Python script executes local Swift helpers.
- [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by ingesting untrusted visual data from the user's screen. 1. Ingestion points: Screen captures initiated in 'scripts/take_screenshot.py' and 'scripts/take_screenshot.ps1'. 2. Boundary markers: Absent for visual image data. 3. Capability inventory: Across its scripts, the skill can execute subprocesses, write files, and access system-level screenshot tools. 4. Sanitization: No sanitization or filtering is performed on the visual content of the captured images.
Audit Metadata