screenshot
Fail
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Vulnerability detected in
scripts/adapters/desktop.py. The_find_window_ids_macosand_list_windows_macosmethods use f-strings to interpolate user-controlled variables (app_name,window_title) directly into Python code executed viapython3 -c. This allows for arbitrary code execution if a malicious application name is provided. - [EXTERNAL_DOWNLOADS]: The skill automatically installs the
@playwright/mcppackage from the npm registry usingnpm install -gif the tool is not found during pre-flight checks. It also utilizescurlto transmit captured image data to third-party hosting services including0x0.standapi.imgbb.com. - [REMOTE_CODE_EXECUTION]: The skill implements a Windows capture method that writes a dynamic PowerShell script to a temporary file and executes it with
-ExecutionPolicy Bypass, which bypasses local script execution restrictions. - [COMMAND_EXECUTION]: The orchestrator script
scripts/screenshot.pyand its adapters invoke numerous system utilities (such asscreencapture,scrot,sips, andImageMagick) using subprocess calls with arguments derived from user-supplied strings.
Recommendations
- AI detected serious security threats
Audit Metadata