1password
Warn
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill orchestrates shell operations using
tmux send-keysin background sessions, which can obscure automated command execution from the user's immediate oversight.\n- [CREDENTIALS_UNSAFE]: The workflow relies ontmux capture-paneto retrieve terminal output. This process is highly likely to ingest sensitive information, such as vault lists or plaintext secrets, directly into the agent's context and conversation history.\n- [COMMAND_EXECUTION]: Examples within the skill suggest using the--no-maskingflag withop run, which intentionally disables the 1Password CLI's security feature that redacts secrets from standard output streams.\n- [EXTERNAL_DOWNLOADS]: The skill includes instructions and metadata to install the 1Password CLI through Homebrew, pointing to official and reputable software distribution channels.\n- [PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection by reading raw terminal output. Ingestion points: terminal history retrieved viatmux capture-paneinSKILL.md. Boundary markers: Absent. Capability inventory: Arbitrary shell command execution viatmuxandbrew. Sanitization: Absent.
Audit Metadata