macos-pages
Pass
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on
osascriptto interface with the macOS Pages application. This allows for automated document manipulation, which is the primary purpose of the skill, but executes commands in the local user context. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads raw text from documents without sanitization.
- Ingestion points: The script
scripts/document/get-text.applescriptand the command inSKILL.mdread the entire body text of a document into the agent's context. - Boundary markers: No delimiters or instructions to ignore embedded commands are present when reading document content.
- Capability inventory: The skill has capabilities to write files (
export-pdf.applescript,save.applescript), modify document content (add-text.applescript), and manage document passwords. - Sanitization: There is no evidence of content validation or escaping before document text is processed by the agent.
- [CREDENTIALS_UNSAFE]: The scripts
set-password.applescriptandremove-password.applescriptaccept passwords as command-line arguments. This is an insecure practice as arguments may be visible in process listings or system logs.
Audit Metadata