asciinema-player
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill constructs a shell command by interpolating variables such as
{file_path},{speed}, and{options}into an AppleScript string that is executed viaosascriptin Step 3.2. This string is then sent to an iTerm2 session using thewrite textcommand, which causes the shell in that window to execute the string. - The instructions do not require the agent to quote or sanitize the
{file_path}variable. If a user selects a file with a malicious name containing shell metacharacters (e.g.,; rm -rf /), those commands could be executed in the resulting iTerm2 window. - The use of
osascript -e '...'for command construction is also vulnerable to shell breakage if variables contain single quotes, potentially leading to command execution in the host environment's shell as well. - [COMMAND_EXECUTION]: The skill uses the
Bashtool to executeosascriptfor controlling external applications (iTerm2) andbrewfor software installation. While these are required for the skill's stated purpose, they provide a high degree of control over the local system environment.
Audit Metadata