agent-notifier
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes system commands to provide alerts.
- Evidence:
notify.pyusessubprocess.Popento callafplay(macOS),paplay/aplay(Linux) for sounds, andosascriptfor macOS Notification Center alerts. - Evidence:
notify.pyexecutesgit rev-parse --show-toplevelto determine the project context for the notification title. - Evidence:
setup.pyexecutesnotify.pyviasubprocess.runto send a test notification during installation. - [CREDENTIALS_UNSAFE]: The skill manages sensitive API tokens and passwords.
- Evidence:
setup.pyinteractively prompts the user for Telegram bot tokens, SMTP passwords, and Slack/Discord webhook URLs. - Evidence: These credentials are saved in plain text within the user's home directory at
~/.claude/notify-config.json. This is standard practice for local CLI tools but requires the user to secure their local filesystem. - [DATA_EXFILTRATION]: The skill is designed to send agent status information to external services.
- Evidence:
notify.pysends event messages (e.g., "Task completed", "Permission required") to well-known services including Telegram, Slack, and Discord, as well as via SMTP email. - Note: This behavior is the intended primary function of the skill.
- [PROMPT_INJECTION] (Indirect): The skill processes data from AI agent hooks which could potentially contain malicious content if the agent is compromised.
- Ingestion points: Reads from
stdininnotify.pyand command-line arguments. - Boundary markers: Absent. The script treats the entire input as the event payload.
- Capability inventory:
subprocesscalls (osascript,afplay, etc.) and network requests (urllib.request). - Sanitization: Partial. The script escapes double-quotes when building the AppleScript string for
osascriptbut does not perform comprehensive validation of the incoming message content.
Audit Metadata