imessage
Fail
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
imessage_cli.shis vulnerable to AppleScript injection. The input variableTOis interpolated directly into theosascriptcommand block without any sanitization or escaping. This allows a malicious actor to break out of the string literal and execute arbitrary shell commands on the host system using the AppleScriptdo shell scriptfunction. For example, a payload in thetoparameter likedummy" & (do shell script "whoami") & "would execute the command. - [DATA_EXFILTRATION]: The skill's primary function is to send messages to external phone numbers or email addresses. While this is its intended purpose, it creates a significant exfiltration vector. An agent or a malicious prompt could use this tool to transmit sensitive files, credentials, or environment variables to an external destination controlled by an attacker.
- [DATA_EXFILTRATION]: The script reads input parameters from stdin without filtering, which can include sensitive content generated or retrieved by the agent in previous steps.
- [COMMAND_EXECUTION]: While the
MESSAGEvariable undergoes basicsedescaping for double quotes and backslashes, this does not fully mitigate the risk of specialized AppleScript injection or logic manipulation within thetell applicationblock.
Recommendations
- AI detected serious security threats
Audit Metadata