apple-music
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runto execute AppleScript and system utilities likeosascriptandopenfor controlling the Music app and opening URLs. - Ingestion points: User-supplied track names, artists, and playlist names are interpolated into scripts in
src/applemusic_mcp/applescript.py. - Boundary markers: The skill instructions in
SKILL.mdandapplescript.pyemphasize the importance of string escaping. - Capability inventory: The skill is capable of executing arbitrary AppleScript and JavaScript via JXA through the
osascriptbinary. - Sanitization: Robust sanitization is implemented in
_escape_for_applescript(), which strips control characters like newlines (preventingdo shell scriptinjection) and escapes double quotes and backslashes. - [SAFE]: No indicators of data exfiltration, persistence, or prompt injection were detected. The use of local system commands is restricted to the intended purpose of media management and is mitigated by input sanitization.
Audit Metadata