macos-process-injection
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill provides numerous scripts and code templates designed to execute arbitrary shell commands. Examples include C templates using
system("/path/to/payload.sh"), Node.js snippets usingchild_process.execSync('id'), andosascriptcommands for automation-based injection. - [REMOTE_CODE_EXECUTION]: A Python script is provided that connects to an Electron application's debugging port via WebSockets to execute arbitrary code in the main process using the Chrome DevTools Protocol.
- [EXTERNAL_DOWNLOADS]: The skill instructs the user to download and install the
@electron/asarpackage from the NPM registry and execution vianpx @electron/fusesto facilitate patching application files. - [PRIVILEGE_ESCALATION]: Detailed instructions are provided for gaining elevated capabilities, such as using
task_for_pidto obtain task ports (requiring root) and exploiting XPC services via PID reuse attacks to bypass client validation and inherit TCC permissions. - [PROMPT_INJECTION]: The skill includes meta-instructions labeled as 'AI LOAD INSTRUCTION' intended to override the agent's default behavior and safety boundaries by forcing it to adopt an 'Expert Attack Playbook' persona for security bypassing.
Recommendations
- AI detected serious security threats
Audit Metadata