peekaboo

Pass

Audited by Gen Agent Trust Hub on Mar 11, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The skill relies on the peekaboo CLI to perform UI automation tasks such as simulated typing, clicking, and managing applications. These actions require the user to grant Screen Recording and Accessibility permissions to the environment.
  • [EXTERNAL_DOWNLOADS]: The skill's installation process utilizes Homebrew to fetch the peekaboo formula from a third-party tap (steipete/tap/peekaboo), which involves fetching and executing code from an external repository.
  • [DATA_EXFILTRATION]: The tool has the capability to access sensitive user data through its ability to capture screenshots, record the screen, and read the system clipboard. While these are necessary for its automation features, they represent access to potentially sensitive information.
  • [PROMPT_INJECTION]: The see and image commands support an --analyze flag, which creates a surface for indirect prompt injection if the agent interprets instructions visible on the user's screen during automation. (Ingestion points: Screen analysis output via see/image in SKILL.md; Boundary markers: Absent; Capability inventory: click, type, press, app, clipboard in SKILL.md; Sanitization: Absent).
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 11, 2026, 07:29 AM