asc-notarization
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The skill executes various macOS development tools (
security,codesign,xcodebuild,xcrun) required for the notarization process. These are the primary and intended functions of the skill. - Evidence: Commands like
security find-identityandxcodebuild archiveare standard for macOS app distribution. - [DATA_EXFILTRATION] (SAFE): The skill interacts with the macOS keychain to sign binaries locally. It does not attempt to exfiltrate private keys or credentials to external servers.
- Evidence: Certificate handling is restricted to local verification and signing operations.
- [EXTERNAL_DOWNLOADS] (LOW): A
curlcommand is used to download notarization logs for debugging purposes. This is a common troubleshooting practice for developers. - Evidence:
curl -sL "LOG_URL" | python3 -m json.toolin the troubleshooting section. The content is formatted but not executed. - [PROMPT_INJECTION] (SAFE): No instructions designed to override agent behavior or safety protocols were found in the file content.
- [INDIRECT_PROMPT_INJECTION] (LOW): The skill ingests a log URL from the output of a previous command. This is documented as a surface for indirect injection, though the usage here (piping to a JSON formatter) is benign.
- Ingestion points:
LOG_URLplaceholder in Step 5. - Boundary markers: None.
- Capability inventory:
curlnetwork access,python3execution. - Sanitization: None, though
json.tooleffectively prevents execution of the downloaded content.
Audit Metadata