telegram-channel-parser
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/posting_schedule.shconstructs and executes a shell command using data directly parsed from an external website. It interpolates thedatetimeattribute from Telegram posts into adate -dcommand without sufficient sanitization, creating a potential command injection vector if the external source is compromised or provides malformed data. - [COMMAND_EXECUTION]: The
scripts/common.shscript uses theevalcommand on variables derived from the local.envconfiguration file. Additionally, theload_configfunction sources the configuration file directly (. "$CONFIG_FILE"), which executes its contents as a shell script, posing a risk if the configuration file is modified by an untrusted source. - [PROMPT_INJECTION]: The React artifact template
assets/digest-feed.tsxutilizesdangerouslySetInnerHTMLto render content from Telegram posts. While the AWK parser inscripts/parse_tg_posts.awkattempts to remove some HTML tags and thestyleattribute, it does not use a robust whitelist or strip event handlers (such asonclickoronerror). This creates a surface for indirect prompt injection or XSS within the agent's UI environment. - [PROMPT_INJECTION]: The skill ingests untrusted data from public Telegram channels and processes it to create digests and analytics without implementing boundary markers or explicit instructions to the agent to ignore any embedded directives within the channel content (Category 8 surface).
Audit Metadata