mac-optimizer
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a custom bash script
mac-optimize.shto perform a deep audit of the macOS system, including process lists, disk status, and power settings.\n- [CREDENTIALS_UNSAFE]: The script usesps auxto audit running processes. This can expose sensitive credentials or tokens if they are passed as command-line arguments. The developer has implemented aredactfunction usingsedto mask common secret keywords, though this heuristic approach may not capture all sensitive data formats.\n- [DATA_EXFILTRATION]: The skill collects detailed system metadata, including active network connection counts, names of login items, and third-party launch agents. This data is exposed to the AI agent context for analysis. No automated external data transmission was detected in the skill's code.\n- [PROMPT_INJECTION]: The skill processes untrusted system output (such as process names and file paths) and provides it to the AI agent, creating an indirect prompt injection surface.\n - Ingestion points: System audit results from
ps,ls, andnetstatin themac-optimize.shscript.\n - Boundary markers: The
SKILL.mddoes not employ specific delimiters or instructions to ignore embedded commands when the agent processes the script's output.\n - Capability inventory: The skill is configured with the
Bashtool, which allows for further system modification based on the analysis.\n - Sanitization: Heuristic redaction is used for secret masking, but no specific sanitization is applied to prevent the agent from interpreting malicious strings embedded in process or file metadata.
Audit Metadata