douyin-cli
Fail
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
_runfunction indouyin_sign.pyexecutes system commands usingsubprocess.run(cmd, shell=True). Several functions, including_navigateand_wait_for_content, construct these command strings by interpolating variables likeurlandselectorwhich are influenced by user-provided keywords and IDs from CLI arguments. This pattern is highly susceptible to command injection if an attacker provides inputs containing shell metacharacters (e.g.,;,&, or|). - [CREDENTIALS_UNSAFE]: The skill manages user authentication by storing session cookies in plain text at
data/douyin_cookie.txt. These cookies, including sensitive session identifiers, are not encrypted or protected by OS-level secret storage, making them accessible to any local user or malicious process. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection because it ingests untrusted data from the Douyin web interface and passes it to the agent.
- Ingestion points: Data is extracted from
douyin.comDOM (descriptions, comments, user profiles) viaagent-browser evalindouyin_sign.py. - Boundary markers: Absent; scraped content is returned without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill has the capability to execute shell commands via
subprocess.runand write to the local filesystem. - Sanitization: Absent; the script perform simple text slicing but does not filter for malicious instructional patterns.
- [EXTERNAL_DOWNLOADS]: The skill relies on external dependencies and tools, specifically
agent-browser(installed via npm) and Chromium (installed via Playwright), which are required for its core functionality but are not from the pre-defined trusted vendor list.
Recommendations
- AI detected serious security threats
Audit Metadata