vm-lab
Pass
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
prlctlcommand-line utility to manage and interact with Parallels Virtual Machines. This includes listing VMs (prlctl list), executing commands in the guest (prlctl exec), capturing screenshots (prlctl capture), and sending keyboard events via a JSON payload. - [COMMAND_EXECUTION]: The helper script
scripts/parallels_type.pyuses the Pythonsubprocessmodule to programmatically send key events to the VM. It uses the list-based invocation method (e.g.,subprocess.run(['prlctl', ...])), which avoids shell injection vulnerabilities on the host system. - [DATA_EXPOSURE]: The skill captures screenshots of the guest VM and saves them to the host's
/tmpdirectory for verification purposes. The instructions explicitly warn against printing secrets and suggest usingtmuxfor sensitive operations inside the VM. - [SAFE]: Instructions for using
sudoare specifically targeted at the guest environment (e.g.,sudo -u steipete) to manage user context within the VM lab. This does not represent a privilege escalation risk to the host machine. - [SAFE]: The skill's primary purpose is GUI automation and testing in a lab environment. The tools and techniques described (e.g.,
sipsfor image metadata,Ghosttyfor terminal access) are standard developer tools consistent with the stated intent.
Audit Metadata