collect
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: Vulnerable to indirect prompt injection due to the ingestion and processing of untrusted external data.
- Ingestion points: External content fetched from RSS feeds, GitHub project descriptions, and social media trends via the 'newsnow' API.
- Boundary markers: Absent; prompt templates in the
analysis/directory do not include delimiters or specific instructions to ignore malicious commands embedded in the data being analyzed. - Capability inventory: Fetched data is processed by LLM sub-agents, aggregated by a 'synthesizer' agent, and finally sent to a messaging platform (Feishu) using the
tell-meskill. - Sanitization: The
stripHTMLfunction infetcher.mjsremoves HTML tags but does not filter out plain-text malicious instructions. - [EXTERNAL_DOWNLOADS]: The skill regularly fetches data from several external domains including
github.com, various RSS endpoints (techcrunch.com,ruanyifeng.com, etc.), and a third-party aggregator atnewsnow.busiyi.world. - [COMMAND_EXECUTION]: Employs shell commands and sub-processes to perform its tasks.
scripts/collect.mjsuseschild_process.spawnto run individual collector scripts.scripts/collectors/gh-trending.mjsusesexecSyncto runcurlfor bypassing standard fetch limitations on GitHub.
Audit Metadata