lovstudio-finder-action
Warn
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides templates for generating shell scripts and Swift code. It specifically guides the agent to create a 'Helper App' in
/Applications/that executes arbitrary shell commands retrieved from the system clipboard usingpbpaste. This is an architectural pattern used to escape macOS sandbox restrictions. - [COMMAND_EXECUTION]: The skill dynamically generates and compiles Swift code using
xcodegenandxcodebuild, then installs the resulting binaries into/Applications/and registers them with the system usingpluginkit. - [COMMAND_EXECUTION]: The instruction set includes the creation of
.workflowfiles in~/Library/Services/and the execution of system-level commands likekillall Finderand/System/Library/CoreServices/pbs -updateto register new services. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it takes untrusted user descriptions of desired actions and interpolates them directly into shell script templates and Swift code (e.g.,
ACTION_IMPLEMENTATIONinFinderSync.swift). There are no explicit boundary markers or sanitization steps documented to prevent the generated code from performing unintended operations if the user input contains malicious instructions. - [COMMAND_EXECUTION]: The
xcodegen-template.ymlfile includes configurations for entitlements that request broad filesystem access viacom.apple.security.temporary-exception.files.absolute-path.read-writetargeting the root path (/), which violates the principle of least privilege.
Audit Metadata