Daily Briefing
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
The skill is designed for a benign purpose (daily briefing) and its core logic aligns with this. However, it is classified as suspicious due to several factors: 1) The `scripts/generate-and-send.sh` script uses fragile `grep`/`cut`/`sed` parsing to extract the recipient from `config/config.yaml`. If `config.yaml` were compromised, a malicious `recipient` value could potentially lead to shell injection in the `imsg` command executed by `scripts/send-briefing.sh`, or at minimum, allow the briefing content to be exfiltrated to an arbitrary email address. 2) The skill relies on external binaries (`imsg`, `codexbar`) installed from a third-party Homebrew tap (`steipete/tap`), introducing a supply chain risk. There is no evidence of intentional malice within the skill's code or agent instructions, but these vulnerabilities and dependencies warrant a 'suspicious' classification.
