apple-music

Pass

Audited by Gen Agent Trust Hub on May 13, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses subprocess.run to execute AppleScript and system utilities like osascript and open for controlling the Music app and opening URLs.
  • Ingestion points: User-supplied track names, artists, and playlist names are interpolated into scripts in src/applemusic_mcp/applescript.py.
  • Boundary markers: The skill instructions in SKILL.md and applescript.py emphasize the importance of string escaping.
  • Capability inventory: The skill is capable of executing arbitrary AppleScript and JavaScript via JXA through the osascript binary.
  • Sanitization: Robust sanitization is implemented in _escape_for_applescript(), which strips control characters like newlines (preventing do shell script injection) and escapes double quotes and backslashes.
  • [SAFE]: No indicators of data exfiltration, persistence, or prompt injection were detected. The use of local system commands is restricted to the intended purpose of media management and is mitigated by input sanitization.
Audit Metadata
Risk Level
SAFE
Analyzed
May 13, 2026, 01:05 PM