adb-ui-tree
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill uses
adb shellandadb pullto execute commands on a connected Android device and retrieve files. This provides the agent with direct access to the device's operating system environment and filesystem. - [DATA_EXFILTRATION] (MEDIUM): The skill captures screenshots (
adb exec-out screencap) and UI dumps (uiautomator dump). This represents a significant risk of exposing sensitive user data (PII), such as credentials, personal messages, or financial information, depending on what is displayed on the screen during execution. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill ingests and potentially analyzes untrusted data from the device, including UI XML files and logcat logs. Malicious applications could inject instructions into UI text or system logs to manipulate the agent's behavior.
- Ingestion points:
ui.xml,adb logcatoutput. - Boundary markers: None identified.
- Capability inventory:
adb shellexecution, file pulling viaadb pull. - Sanitization: None identified.
Audit Metadata