agent-interact
Fail
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: Vulnerability to command injection in
pywebview/window.py. Theshow_notificationfunction constructs an AppleScript command via f-strings using themessageandtitleparameters provided in dialog requests. Since these inputs are not sanitized, a malicious payload (e.g., containing double quotes and thedo shell scriptcommand) can break out of the string context and execute arbitrary shell commands on the host system. - [COMMAND_EXECUTION]: The script
tool.jsmakes extensive use ofchild_process.spawnandchild_process.execSyncto manage its environment. This includes starting the Express backend, invoking Python for window management, and executing build scripts likenpm run build. - [EXTERNAL_DOWNLOADS]: During installation or updates,
tool.jstriggersnpm installin multiple directories, which downloads third-party packages from the public NPM registry. - [COMMAND_EXECUTION]: The skill launches
pywebview/window.pyas a detached subprocess to manage native system windows, as seen in thestartPywebviewfunction intool.js.
Recommendations
- AI detected serious security threats
Audit Metadata