yy-wx-to-markdown
Warn
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/run_cli.mjsimplements a file-writing feature that accepts an arbitrary output path from command-line arguments. It utilizesfs.writeFileSyncwithpath.resolve(outputPath)without any path validation or restriction to a specific directory. This enables an attacker or a manipulated agent to overwrite sensitive system files or configuration files by providing a malicious path. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection (Category 8) as it fetches and processes content from external, third-party WeChat articles and returns the resulting Markdown to the agent's context.
- Ingestion points: The
wxArticleToMarkdownfunction inscripts/wechat_article_parser.mjsperforms network requests viafetchto retrieve external HTML content. - Boundary markers: While the output uses YAML frontmatter and standard Markdown headers as structure, it lacks explicit delimiters or instructions telling the agent to treat the converted article body as data rather than instructions.
- Capability inventory: The associated
scripts/run_cli.mjsprovides the capability to write files to the local file system. - Sanitization: The conversion logic in
scripts/wechat_article_parser.mjsfocuses on HTML tag removal and character escaping but does not perform any semantic analysis or sanitization to prevent embedded natural language instructions from influencing the agent.
Audit Metadata