zhihu-post

Fail

Audited by Socket on Mar 5, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

This package is an automation 'skill' for posting to Zhihu by controlling a user's Chrome via a Browser Relay. The code/instructions do not contain explicit malware, obfuscated payloads, or remote command-and-control. However, the required capabilities (full control of an attached Chrome session and the ability to read a local upload directory) are high-risk: they allow publishing as the user and can be repurposed to exfiltrate files or perform other actions with the user's authenticated session. Recommend: (1) treat the Browser Relay extension as a high-trust component and audit it before use, (2) require explicit, per-action human confirmation before any publish/upload operation, (3) restrict and validate allowed upload file types and paths, and (4) log and surface every automated action to the user for review.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 5, 2026, 08:02 AM
Package URL
pkg:socket/skills-sh/aAAaqwq%2FAGI-Super-Skills%2Fzhihu-post%2F@38bd453421a32d2b816d77347c607469b2b5066d