apple-container
Fail
Audited by Gen Agent Trust Hub on Apr 5, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
container system kernel set --tar <url>command enables downloading and installing a Linux kernel from any remote URL. This allows for the execution of untrusted code at a deep system level if a malicious URL is provided.\n- [DATA_EXFILTRATION]: The--sshoption in thecontainer runcommand mounts the host's SSH authentication socket (SSH_AUTH_SOCK) into the container environment. This creates a significant risk where a malicious container image could access, use, or exfiltrate the user's host SSH keys.\n- [COMMAND_EXECUTION]: The skill requires the agent to execute commands with elevated privileges, specifically usingsudofor DNS configuration and managing system services vialaunchd.\n- [EXTERNAL_DOWNLOADS]: The skill facilitates the download of external content, including container images from public registries and kernel binaries from remote repositories, which may not be verified for integrity.\n- [PROMPT_INJECTION]: The skill metadata uses branding ('Apple's native container runtime') that deceptively implies official status. This form of metadata poisoning could mislead the agent or user regarding the skill's authority and safety, given it is authored by an unaffiliated third party.
Recommendations
- AI detected serious security threats
Audit Metadata