Apple iCloud Suite

Pass

Audited by Gen Agent Trust Hub on Mar 11, 2026

Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The suite utilizes the Apple ID Master Password to authenticate with iCloud services via the pyicloud library. Users provide these credentials through environment variables or interactive terminal prompts as required by the underlying API.- [DATA_EXFILTRATION]: User GPS coordinates are transmitted to the Amap (高德地图) reverse geocoding API to determine semantic location names for the 'Status Wall' tracking feature. This interaction uses a user-provided API key and targets a well-known technology service.- [COMMAND_EXECUTION]: The suite employs the Python subprocess module within the status_wall.py and icloud_calendar.py scripts to manage background daemon processes and facilitate communication between internal tools.- [PROMPT_INJECTION]: The skill processes external data such as file names from iCloud Drive and titles from shared calendars. This constitutes an indirect prompt injection surface where malicious instructions embedded in iCloud metadata could theoretically influence agent behavior.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 11, 2026, 03:02 AM