unix-macos-engineer
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [Persistence Mechanisms] (MEDIUM): The file
references/launchd-patterns.mdprovides complete templates for creating LaunchAgents and LaunchDaemons. These allow scripts to execute automatically at login or boot, providing a standard mechanism for persistence on macOS. While intended for administration, these patterns are commonly used in malware for maintaining access. - [Privilege Escalation] (MEDIUM): Multiple files (e.g.,
references/macos-commands.md) provide instructions for usingsudoto perform high-privilege tasks, such as rebuilding Spotlight indexes, flushing DNS caches, and scheduling system shutdowns. It also mentionscsrutil disablefor bypassing System Integrity Protection (SIP). - [Data Exposure] (LOW): The
securitycommand reference inreferences/macos-commands.mddocuments how to retrieve passwords from the macOS Keychain (security find-generic-password). While useful for automation, this represents a significant data exposure risk if the agent is instructed to exfiltrate these secrets. - [Command Execution] (LOW): The skill heavily emphasizes shell scripting and provides patterns for
osascript(AppleScript), which can be used to control other applications and bypass certain UI-based security prompts. - [External Downloads] (LOW): References to Homebrew (
brew install) andcurlare present. These allow the agent to download and install third-party software and communicate with external servers. - [Indirect Prompt Injection] (LOW):
- Ingestion points: The skill facilitates reading command outputs (
pbpaste,cat,while read) which could contain untrusted data. - Boundary markers: Templates lack explicit markers or warnings to ignore embedded instructions in processed data.
- Capability inventory: Full access to shell execution, file system writes, and network operations via
curl. - Sanitization: Recommends defensive shell practices (
set -euo pipefail), but does not include specific sanitization logic for external input.
Audit Metadata