automating-notes
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (LOW): Indirect prompt injection surface identified in Category 8. The skill handles untrusted data (note titles, bodies, and search terms) provided by the user or read from external sources, which could influence the agent's behavior if it interprets malicious instructions embedded in note content.
- Ingestion points:
scripts/create_note.pyandscripts/search_notes.pyaccept external input via command-line arguments. - Boundary markers: Absent in scripts; the documentation in
SKILL.mdprovides manual guidance to sanitize input, but no technical enforcement is present. - Capability inventory: The skill has the ability to execute commands via
osascriptand automate application state via PyXA/JXA. - Sanitization: Absent in the provided scripts; the skill relies on the LLM to follow the instruction to 'Always sanitize HTML input'.
- [COMMAND_EXECUTION] (SAFE): The scripts
scripts/set_up_notes_automation.pyandscripts/set_up_notes_automation.shutilizeosascriptto trigger macOS Automation permission prompts. This is a legitimate and necessary pattern for macOS-specific application automation and is restricted to read-only discovery of account/folder names in the setup phase.
Audit Metadata