macos-resource-optimizer
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Unverifiable Dependencies & Remote Code Execution] (CRITICAL): The installation script
extensions/chrome-tab-suspender/check-install.shcontains a dangerous piped-shell execution pattern:curl -LsSf https://astral.sh/uv/install.sh | sh. This executes code directly from an external URL without integrity verification or pinning, providing a direct vector for Remote Code Execution (RCE). - [Indirect Prompt Injection] (HIGH): The skill processes untrusted external data (process names, command-line arguments, and browser tab titles/URLs) and possesses high-privilege capabilities including process termination and file deletion.
- Ingestion points:
scripts/process_analyzer_uv.py(viapsutil.process_iter),scripts/tab_suspender.py(via Chrome Native Messaging), andextensions/chrome-tab-suspender/background.js(viachrome.tabs.query). - Boundary markers: Entirely absent. The skill performs string matching against raw data without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill uses
subprocess.run,asyncio.create_subprocess_exec,pkill, andrm -rf(found inscripts/_archive/one-time/execute-cleanup.sh). - Sanitization: None. Data from the system or browser is used directly in logic decisions and diagnostic output, allowing an attacker to influence agent behavior by naming a process or a browser tab with malicious instructions.
- [Privilege Escalation] (HIGH): The file
SETUP-PASSWORDLESS-SUDO.mdprovides explicit instructions for the user to disable password prompts (NOPASSWD) in thesudoersfile for several system binaries (purge,vm_stat,sysctl). This reduces the security posture of the operating system and can be leveraged by other malicious processes to perform privileged actions. - [External Downloads] (LOW): The skill performs downloads from
astral.sh. Whileuvis a known utility, this domain is not included in the provided list of Trusted External Sources, and the download is used to facilitate the critical RCE finding mentioned above.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://astral.sh/uv/install.sh - DO NOT USE
- AI detected serious security threats
Audit Metadata