tmux-session-manager
Warn
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
tmux send-keysto run arbitrary shell commands in a user's tmux pane, which provides the agent with full command-line access under the user's permissions. - [DATA_EXFILTRATION]: The skill uses
tmux capture-paneto retrieve the contents of the terminal buffer and scrollback history. This can lead to the exposure of sensitive data, such as secrets, credentials, or private logs, if they are visible in the terminal. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes terminal output that may contain untrusted data. * Ingestion points: Terminal content is read using
tmux capture-paneas described inSKILL.md. * Boundary markers: There are no delimiters or specific instructions to ignore malicious commands embedded within the captured terminal output. * Capability inventory: The agent has unrestricted shell access via thetmux send-keyscommand. * Sanitization: The skill does not perform any validation or sanitization on the data captured from the terminal buffer before processing it.
Audit Metadata