vacuumtube-live-cam-tile-full
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill dynamically generates a JavaScript file at
/tmp/codex_kwin_layout_4cams_full.jsusing shell-interpolated variables (PIDs and screen dimensions). - The generated script is then loaded and executed via the
org.kde.KWin /ScriptingDBus interface to precisely position application windows. - [COMMAND_EXECUTION]: Extensive use of system administration and X11 utilities to manipulate the desktop environment, including:
xrandrandawkto parse display dimensions.lsofto identify process IDs associated with specific network ports (9993-9996).qdbusto communicate with the KWin window manager.pactlto manage and verify audio sink mute states.- [EXTERNAL_DOWNLOADS]: The skill interacts with the YouTube TV interface at
https://www.youtube.com/tv/to load specific live camera streams. These interactions are performed via CDP (Chrome DevTools Protocol) using a local Node.js script. - [DATA_EXFILTRATION]: The skill accesses the
~/.Xauthorityfile. While this is a sensitive security cookie for X11, it is used here to ensure the script has the necessary permissions to interact with the local display server.
Audit Metadata