powerskills-desktop
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
launchaction indesktop.ps1uses theStart-Processcmdlet to execute any application with arbitrary arguments provided via the--appand--app-argsparameters. - [COMMAND_EXECUTION]: The
keysaction utilizes[System.Windows.Forms.SendKeys]to send arbitrary keyboard input to the system. This allows for the execution of commands within terminals or interaction with sensitive UI elements (like configuration menus or password fields) if they are in focus. - [DATA_EXFILTRATION]: The
screenshotaction captures visual data from the primary monitor or specific windows and saves it to a file. This capability can be used to capture sensitive information displayed on the screen. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. If the agent reads a malicious file or website and subsequently uses that data to populate the
--keysor--app-argsparameters, it could lead to unauthorized command execution. - Ingestion points: Data provided to the
--keys,--app, and--app-argsparameters (processed indesktop.ps1). - Boundary markers: None identified; parameters are passed directly to system execution functions.
- Capability inventory: File system writes (
screenshot), process execution (launch), and UI interaction (keys). - Sanitization: No validation or escaping is performed on the input strings before they are passed to
Start-ProcessorSendKeys. - [DYNAMIC_EXECUTION]: The script uses
Add-Typeto compile C# code at runtime to interface with Win32 APIs (user32.dll) for window enumeration and manipulation.
Audit Metadata