adb-bypass
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill facilitates the execution of local Python scripts using the
uvrun tool and interacts with Android devices viaadbshell commands to verify root status and module activity. - [PROMPT_INJECTION]: A surface for indirect prompt injection exists because the skill monitors
adb logcatoutput to verify bypass effectiveness. Malicious applications on the connected device could write crafted strings to the log buffer to influence the agent's assessment of the security state. - Ingestion points: Monitoring device logs via
adb logcatas described in the troubleshooting section. - Boundary markers: None identified; the documentation suggests simple keyword filtering (e.g.,
grep) without sanitization. - Capability inventory: Execution of Python scripts (
preflight-validation.py) and potential triggering of downstream app automation (adb-karrot) based on validation results. - Sanitization: Not documented; the skill appears to rely on raw log output matching.
Audit Metadata