spotify
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: Communicates exclusively with official Spotify domains (
api.spotify.comandaccounts.spotify.com) for authentication and playback control. - [COMMAND_EXECUTION]: Uses common system utilities (
curl,jq,nc,openssl) to handle API requests and local OAuth callbacks. - The
spotify-auth.shscript usesnc(netcat) to listen on a local port (17823) for the OAuth redirect, which is a standard pattern for command-line OAuth implementations. - [DATA_EXFILTRATION]: Accesses authentication tokens and credentials stored in
~/.config/spotify/. The scripts correctly usechmod 600to restrict access to these files to the current user. - [PROMPT_INJECTION]: The
SKILL.mdfile contains only functional instructions for controlling Spotify and does not include any patterns typical of prompt injection or safety bypass attempts. - [REMOTE_CODE_EXECUTION]: No remote code execution or dynamic script evaluation was detected. Commands are executed through local scripts with static templates.
Audit Metadata