xcode-build-resolver
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The diagnostic script
scripts/quick-diagnostic.shis vulnerable to arbitrary command injection due to the use ofevalon unsanitized script arguments. - Evidence: The script constructs a
BUILD_CMDstring using variables$SCHEME,$WORKSPACE, and$CONFIGURATIONwhich are then executed viaeval "$BUILD_CMD"on line 185. - Risk: If an attacker can influence these parameters (e.g., via a malicious project name or configuration found in a repository the agent is analyzing), they could execute arbitrary shell commands on the host system.
- [EXTERNAL_DOWNLOADS]: The skill documentation and scripts facilitate the download of third-party dependencies from external repositories.
- Evidence: Instructions and references include the use of
pod install --repo-updateandswift package resolveto fetch external modules. - Context: While these are standard developer operations, they involve downloading and potentially executing code from remote sources (GitHub, CocoaPods CDN).
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it processes untrusted project data and build logs without sanitization or strict boundary markers.
- Ingestion points: The skill reads build error logs, file contents, and project configuration files (
Package.swift,Podfile,.xcworkspace). - Boundary markers: No delimiters or explicit instructions are provided to the agent to ignore instructions embedded within the files being analyzed.
- Capability inventory: The skill utilizes powerful CLI tools including
xcodebuild,swiftc,pod, and thesecurityutility, alongside the vulnerablequick-diagnostic.shscript. - Sanitization: No evidence of input validation, escaping, or filtering of content extracted from the project environment before it is passed to shell commands or the diagnostic script.
Audit Metadata