Imessage Notify

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill does what it says (uses AppleScript to send iMessage via the local Messages app) but it contains hard-coded Apple ID/email addresses and instructions that can cause automated exfiltration of local files to a third party, which is inconsistent with a safe, generic 'send notifications to your phone' skill.

Before installing or enabling this skill, review and modify the scripts: 1) Replace the hard-coded recipient and sender addresses with your own Apple ID or require an explicit --recipient argument; 2) Never integrate these scripts into automated tasks that handle sensitive data unless you add explicit confirmation prompts and strict path whitelisting; 3) Test with a non-sensitive message first to verify it uses your Messages account; 4) Do not run these on shared machines or CI runners (they will attach and send any file paths you pass); 5) If you want automatic notifications, consider adding safeguards (prompting, logging, or limiting attachments) and a configuration step that requires the installing user to opt-in and set their own recipient. Because the default behavior will send files to a third-party address, avoid enabling this skill until you remove the hard-coded addresses and confirm it uses your account.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

No VirusTotal findings

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.