skills/adamlyttleapps/claude-skill-aso-appstore-screenshots/aso-appstore-screenshots/Gen Agent Trust Hub
aso-appstore-screenshots
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and analyzes untrusted codebase files (UI controllers, README files, and metadata) to derive marketing benefits. Instructions or malicious text hidden in these files could influence the subsequent image generation prompts.
- Ingestion points: Project codebase analysis (UI files, models, and metadata) in
SKILL.mdduring the Benefit Discovery phase. - Boundary markers: None; the skill does not use specific delimiters or instructions to prevent derived text from overriding generation parameters.
- Capability inventory: Local execution of Python scripts, system command execution via
bash(sipsutility), and AI image generation capabilities viaedit_imageandgenerate_imagetools. - Sanitization: None; codebase-derived strings are interpolated directly into prompts for the AI image tools without validation or escaping.
- [COMMAND_EXECUTION]: The skill utilizes the
bashtool to execute internal Python processing scripts (compose.py,showcase.py) and the macOSsips(Scriptable Image Processing System) utility. These tools are used locally to composite images, crop them to specific aspect ratios, and resize them for App Store Connect compatibility.
Audit Metadata