apple-photos
Fail
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Multiple scripts, including
photos-search-person.sh,photos-search-date.sh, andphotos-export.sh, directly interpolate user-provided arguments into shell commands and SQLite queries without sanitization. This allows for SQL injection or command manipulation. - [REMOTE_CODE_EXECUTION]: The
photos-search-content.shscript is vulnerable to AppleScript injection. The$QUERYvariable is placed inside a double-quoted AppleScript string executed viaosascript. An attacker could break out of this string and use thedo shell scriptcommand to execute arbitrary shell commands on the host machine. - [DATA_EXFILTRATION]: The skill accesses highly sensitive personal data stored in the Apple Photos library database (
~/Pictures/Photos Library.photoslibrary/database/Photos.sqlite), including facial recognition identification. Furthermore,scripts/photos-info.shexplicitly extracts and displays latitude and longitude coordinates (GPS data) associated with assets. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection. It ingests untrusted data from the user's photo library (such as filenames and person names) and presents it to the agent. Because the skill possesses capabilities to execute shell commands and write to the file system, a malicious entry in the library could be used to influence the agent's behavior. Evidence: Ingestion points include SQLite results in
photos-recent.shandphotos-list-people.sh; no boundary markers or sanitization logic are present; capabilities include subprocess calls tosqlite3,osascript, andmagickacross the script suite.
Recommendations
- AI detected serious security threats
Audit Metadata