asc-notarization
Warn
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill accesses the user's login keychain (
~/Library/Keychains/login.keychain-db) to find and export certificates. This is a highly sensitive file path containing cryptographic materials. - COMMAND_EXECUTION (MEDIUM): It uses the
security remove-trusted-certcommand to modify system or user trust settings, which can impact the overall security posture of the machine. - CREDENTIALS_UNSAFE (MEDIUM): The skill exports a Developer ID certificate to
/tmp/devid-cert.pem. Files in/tmpare often world-readable, creating a risk of credential exposure to other users or processes on the system. - COMMAND_EXECUTION (MEDIUM): Relies on a third-party CLI tool
ascfor App Store Connect interactions. Unlike the officialxcrun notarytool, the source and integrity of this tool are not verified within the skill. - EXTERNAL_DOWNLOADS (LOW): Uses
curl -sLto fetch notarization logs from a runtime-providedLOG_URL. While the output is piped to a JSON formatter, fetching data from arbitrary URLs presents a minor network risk. - COMMAND_EXECUTION (LOW): Uses
hdiutil,productsign, andcodesignto perform archive and distribution tasks. These are standard Apple utilities but involve significant system interactions.
Audit Metadata