peekaboo
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is highly vulnerable to indirect prompt injection through its vision and analysis features.
- Ingestion points: The
see,image, andcapturecommands ingest untrusted data directly from the user's screen, windows, and UI elements. - Boundary markers: None identified. The skill instructions do not specify any delimiters or instructions to ignore embedded content within the UI.
- Capability inventory: The skill has extremely high-privilege capabilities including
click,type,paste,hotkey,app launch/quit, andrun(executing scripts). - Sanitization: None. The vision analysis (
--analyze) likely feeds UI content directly back to the agent's reasoning engine, allowing content on a webpage or document to control the agent's next OS-level action. - [Unverifiable Dependencies] (MEDIUM): The skill installs a binary from a third-party Homebrew tap (
steipete/tap/peekaboo). - Evidence: The YAML metadata specifies a
brewinstallation from a non-whitelisted source. This binary has full access to the user's input and screen data. - [Data Exposure] (HIGH): The skill provides tools to programmatically access sensitive user data.
- Evidence: The
clipboardcommand allows reading the system clipboard, and theimage/capture/seecommands allow full screen and window recording. This data could be exfiltrated if combined with a network-capable agent. - [Privilege Escalation] (HIGH): The skill explicitly requires and checks for high-level macOS TCC permissions.
- Evidence: Requires 'Screen Recording' and 'Accessibility' permissions to function. While legitimate for UI automation, these permissions grant the agent total control over the local user session.
Recommendations
- AI detected serious security threats
Audit Metadata