cmux
Warn
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill exposes the ability to execute arbitrary shell commands through the
cmux new-workspace --commandflag and thesendcommand, which allows the agent to interact directly with terminal sessions. - [REMOTE_CODE_EXECUTION]: The documentation describes a pattern for executing external scripts using process substitution, specifically through the integration with the
erkutility (e.g.,source <(erk pr checkout <pr> --script)). This pattern facilitates the execution of code generated or retrieved by an external source at runtime. - [DATA_EXFILTRATION]: The browser subsystem includes commands to retrieve sensitive session information, including
browser cookies get,browser storage local get, andbrowser storage session get. Additionally, thepipe-panecommand allows for the redirection of terminal output to arbitrary external commands, creating a potential path for data exfiltration. - [PROMPT_INJECTION]: The skill creates an indirect prompt injection surface by providing commands that read untrusted content into the agent's context. Specifically,
read-screeningests terminal output, whilebrowser snapshotandbrowser evalretrieve content from web pages. This data could contain malicious instructions designed to manipulate the agent's behavior. - [REMOTE_CODE_EXECUTION]: The
browser eval,browser addscript, andbrowser addinitscriptcommands allow for the execution of arbitrary JavaScript within the browser surface, which can be used to manipulate web content or exfiltrate data from web sessions.
Audit Metadata