skills/rbouschery/marketplace/spotify/Gen Agent Trust Hub

spotify

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • COMMAND_EXECUTION (MEDIUM): Multiple scripts interpolate user-provided arguments directly into AppleScript via Bash heredocs without adequate sanitization, creating a risk of AppleScript injection.
  • Evidence in scripts/play-uri.sh: The variables $URI and $CONTEXT are interpolated into an osascript <<EOF block. A URI like track" & (do shell script "open /Applications/Calculator.app") & " would break out of the AppleScript string and execute arbitrary shell commands.
  • Evidence in scripts/search.sh: While the query is URL-encoded for the open location command, the script still prints the raw $QUERY in the success message, and the encoding logic relies on a system Python call that could be manipulated if the input is not strictly checked.
  • INDIRECT_PROMPT_INJECTION (LOW): The skill ingests untrusted data from the Spotify app (track names, artists, etc.) which are then returned to the agent context.
  • Ingestion points: scripts/get-current-track.sh reads metadata from the current track.
  • Boundary markers: The skill uses <<>> delimiters to separate fields, which helps with parsing but does not prevent the agent from interpreting instructions embedded in track titles.
  • Capability inventory: The agent has the Bash tool and can execute AppleScript, which includes the powerful do shell script command.
  • Sanitization: There is no evidence of sanitization or escaping of metadata (e.g., song titles) before they are sent back to the agent.
  • DATA_EXPOSURE (SAFE): The skill is designed to access Spotify's internal player state and track information. It does not attempt to access sensitive system files like SSH keys or environment variables.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 06:17 PM