Fail
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
mail_cli.shis vulnerable to command injection. User-supplied parameters like$SUBJECT,$BODY, and$TOare directly interpolated intoosascript(AppleScript) commands and shell command arguments without sanitization. An attacker could provide a crafted subject containing quotes to escape the intended command and execute arbitrary code via the shell or AppleScript runtime. - [COMMAND_EXECUTION]: The script uses unquoted expansion of variables like
$CC_ARGand$BCC_ARGin themailcommand call. This allows an attacker to inject additional command-line flags into the mail utility, potentially leading to unauthorized file reads, alternative configuration loading, or other unintended behaviors depending on the specificmailimplementation. - [DATA_EXFILTRATION]: While the skill's stated purpose is sending email, it can be abused to exfiltrate sensitive information. An attacker could leverage the skill to send system files, environment variables, or private data to an external email address if the agent is manipulated (e.g., via indirect prompt injection) to process sensitive information as the email body or recipient.
Recommendations
- AI detected serious security threats
Audit Metadata