ios-simulator-skill
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill ingests untrusted data from the iOS simulator environment which can be controlled by third-party applications. This creates a high-risk surface where an agent can be manipulated by the app it is testing.
- Ingestion points:
scripts/common/idb_utils.py(reads accessibility tree),scripts/push_notification.py(reads payload files), andscripts/app_launcher.py(reads app metadata). - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded commands in the processed UI data.
- Capability inventory: High-impact capabilities including
simctlcalls for app installation, simulator deletion (simctl_delete.py), and deep link navigation (open_url). - Sanitization: Absent. The skill does not sanitize or validate the content of the UI tree before presenting it to the agent.
- [Command Execution] (MEDIUM): Multiple scripts utilize
subprocess.runto executexcrun simctlandidbcommands with arguments derived from external input like bundle IDs and URLs. While arguments are passed as lists to mitigate shell injection, the high-privilege nature of the actions (e.g.,uninstall,erase,delete) remains a risk under agent manipulation. - [Data Exposure] (LOW):
scripts/push_notification.pyandscripts/visual_diff.pyallow reading local files based on path arguments. While restricted byjson.loadandImage.openrespectively, this could be used to probe the existence or content of files on the host system if the agent is tricked.
Recommendations
- AI detected serious security threats
Audit Metadata