douyin-hot-trend
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/get-hot-trend.jsutilizeschild_process.execSyncto invoke a secondary script. The variablelimit, which is derived directly fromprocess.argv[2], is interpolated into the shell command string without any validation or sanitization. This pattern is vulnerable to command injection if an attacker can influence the command-line arguments provided to the script. - [COMMAND_EXECUTION]: The
cron-job.jsfile useschild_process.execSyncto orchestrate internal script execution. While the usage here is more controlled, the reliance on shell execution for internal logic is a behavior that requires monitoring. - [EXTERNAL_DOWNLOADS]: The skill performs HTTPS requests to
www.douyin.comvia the nativehttpsmodule to retrieve JSON data containing current trending topics. This is an expected behavior given the skill's stated purpose. - [PROMPT_INJECTION]:
- Ingestion points: Trending topic titles and metadata are fetched from the external Douyin API in
scripts/douyin.js. - Boundary markers: None. The external data is parsed and directly embedded into output messages.
- Capability inventory: The skill has the capability to write files to the local file system and execute shell commands via
execSync. - Sanitization: There is no sanitization or escaping of the content retrieved from the external API before it is formatted into messages, which could allow a malicious trending topic to influence the behavior of the agent or downstream systems.
Audit Metadata