take-screenshots
Fail
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONNO_CODE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill's configuration file
scripts/RegionSnip.runtimeconfig.jsonexplicitly setsSystem.Runtime.Serialization.EnableUnsafeBinaryFormatterSerializationtotrue. The .NETBinaryFormatteris a deprecated and inherently insecure mechanism; enabling it allows for deserialization of untrusted data which is a well-known path to arbitrary code execution (RCE) on the host system. - [NO_CODE]: The core functionality is implemented in a pre-compiled Windows executable
RegionSnip.exe. Since the source code for this binary is not provided, its internal operations, security hygiene, and potential for malicious behavior cannot be audited or verified. - [DATA_EXFILTRATION]: The skill is designed to capture desktop screenshots, which inherently risk exposing sensitive information such as credentials, private communications, or internal documents. The documentation specifically highlights that these captures are intended for processing by an LLM, and it mentions an undocumented
includeImage=trueparameter that enables Base64 image output, increasing the surface area for sensitive data exposure. - [COMMAND_EXECUTION]: The skill relies on the execution of a local binary with command-line arguments. Without source visibility or binary integrity checks, this execution model poses a risk of facilitating unauthorized actions if the binary contains undocumented or malicious functionality.
Recommendations
- AI detected serious security threats
Audit Metadata