phonebase
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Initial setup involves downloading and executing a shell script from the vendor's domain
https://get.phonebase.cloudvia a pipe tosh. The skill instructions mandate requesting user confirmation before this installation occurs. - [COMMAND_EXECUTION]: The
pb shellcommand allows the execution of arbitrary commands within the remote Android device's environment. - [EXTERNAL_DOWNLOADS]: The skill facilitates downloading and installing external APKs (
pb install --uri) and supplementary agent skills (pb skills install). - [PROMPT_INJECTION]: The skill surface allows for potential indirect prompt injection.
- Ingestion points: Untrusted data enters the agent context through UI text elements retrieved via
pb dumpcand content from external skill files in~/.phonebase/skills/. - Boundary markers: None identified; the agent is not instructed to treat content from these sources as untrusted.
- Capability inventory: Capabilities include remote shell execution (
pb shell), file transfers (pb push/pull), and software installation. - Sanitization: No validation or sanitization of ingested UI text or skill content is performed before processing.
Audit Metadata