MacPowerTools
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): Path traversal vulnerability in
scripts/drive_transfer.pyvia thedest_folderargument. Evidence: Therun_drive_transferfunction usesos.path.jointo construct the destination path without sanitizing for parent directory references (..). This allows a user or malicious data source to write files to arbitrary locations on the host system. - COMMAND_EXECUTION (SAFE): Robust security implementation in
scripts/transfer.py. Evidence: This module includessanitize_pathfor traversal detection, a strict regex for filename validation (^[a-zA-Z0-9_.-]+$), and a whitelist of allowed Android destination directories. It correctly usesshlex.quotefor all shell-command parameters. - DATA_EXPOSURE & EXFILTRATION (SAFE): System maintenance activities are restricted to expected directories. Evidence: Cleanup operations are targeted at
~/.Trash,~/Library/Caches, and~/Downloads. The skill uses safe standard library functions and includes a dry-run mode to prevent accidental data loss. - INDIRECT PROMPT INJECTION (LOW): Vulnerability surface identified. 1. Ingestion points:
sourceanddest_foldercommand-line arguments. 2. Boundary markers: Absent. 3. Capability inventory: File system write/delete and ADB interaction. 4. Sanitization: Comprehensive for thetransfercommand, but insufficient fordrive-transfer.
Audit Metadata