lovstudio-finder-action
Fail
Audited by Snyk on Apr 30, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.85). This skill documents deliberate sandbox-bypass patterns (temporary-exception.files.absolute-path.read-write: ["/"]), project settings to monitor the entire filesystem (FIFinderSyncController.default().directoryURLs = [URL(fileURLWithPath: "/")]) and a helper-app workflow that takes clipboard contents and executes them via AppleScript/Process, effectively enabling arbitrary command execution and a local backdoor-like execution path that can be abused for remote control or data access.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt instructs creating and installing code that writes to system locations (e.g., /Applications and ~/Library/Services), killing Finder, setting sandbox entitlements including a temporary-exception for absolute-path read-write (effectively bypassing sandbox restrictions) and monitoring "/" — actions that modify system state and suggest bypassing security protections.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata