wechat-article-maker
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/wechat-agent-browser.tsconstructs shell commands using unvalidated article titles and content, then executes them viaexecSync. This creates a critical command injection vulnerability where a maliciously crafted title could execute arbitrary code on the host machine. - [REMOTE_CODE_EXECUTION]:
scripts/md/utils/languages.tsdynamically loads and executes remote JavaScript code fromcdn-doocs.oss-cn-shenzhen.aliyuncs.comusing theimport()function. - [DATA_EXFILTRATION]: Scripts like
scripts/wechat-api.tsaccess and read sensitive configuration files containing WeChat API credentials (AppID and AppSecret) located at~/.awesome-skills/.env. - [EXTERNAL_DOWNLOADS]:
scripts/generate-cover.tsdownloads font files from external mirrors at runtime if they are not present locally. - [PROMPT_INJECTION]: The link-article publishing workflow in
SKILL.mdfetches content from untrusted external URLs and processes it with LLM instructions without sanitization or boundary markers, creating an indirect prompt injection surface. - [COMMAND_EXECUTION]:
scripts/copy-to-clipboard.tsandscripts/paste-from-clipboard.tsgenerate and execute platform-specific scripts at runtime to interact with the system clipboard.
Recommendations
- AI detected serious security threats
Audit Metadata