xiaohongshu-workflow
Fail
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Instructions in
SKILL.mdandREADME.mddirect users to download and execute pre-compiled binaries from the untrusted GitHub accountxpzouying. These binaries are opaque and could contain malicious code, posing a high risk to the host system. - [COMMAND_EXECUTION]: The script
scripts/mcp-call.shis vulnerable to shell command injection. It embeds the unquoted shell variable$TOOL_ARGSdirectly into a double-quoted string within acurlcommand. This allow an attacker to execute arbitrary system commands if user-provided input (such as search keywords) contains command substitution syntax (e.g.,$(...)). - [CREDENTIALS_UNSAFE]: The skill manages Xiaohongshu session credentials in
cookies.json. The scriptscripts/start-mcp.shcopies this sensitive file to/tmp/cookies.json. On most Linux systems, the/tmpdirectory is world-readable, potentially exposing the user's active session and private data to other users on the system. - [EXTERNAL_DOWNLOADS]: The skill downloads the
XHS-Downloadertool and its associated Python dependencies from a third-party GitHub repository (JoeanAmier/XHS-Downloader) without integrity verification. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface when generating reports from external data.
- Ingestion points: The tools
search_feedsandget_feed_detailintrack-topic.pyingest content (titles, descriptions, comments) from external Xiaohongshu posts. - Boundary markers: None detected; the ingested content is interpolated directly into Markdown reports without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill possesses the capability to execute shell commands via
subprocess.runand write files, providing a path for malicious instructions in external data to trigger system actions. - Sanitization: No validation or sanitization of external text is performed before it is processed by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata