another-android
Warn
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
another_shelltool enables the execution of arbitraryadb shellcommands on the connected Android device. This capability allows an agent to perform any action available to the shell user, including modifying system properties, interacting with internal application data, and changing device configurations. - [DATA_EXFILTRATION]: The
another_take_screenshottool allows the agent to capture the device's screen. This may inadvertently expose sensitive information such as private messages, banking details, or credentials if they are visible on the display during the capture. - [DATA_EXFILTRATION]: The
another_shelltool can be used to read and retrieve sensitive files from the device's storage, whileanother_get_device_ipandanother_list_devicesreveal network and hardware identifiers. - [DATA_EXFILTRATION]: The
another_open_urltool can be used to force the device's browser to navigate to arbitrary URLs, which could be leveraged for phishing or to interact with malicious external services.
Audit Metadata