xhs-search-workflow
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection as it is designed to fetch and process untrusted external data.
- Ingestion points:
scripts/fetch_note_texts.pyandscripts/export_notes.pyretrieve note titles, descriptions, and comments from Xiaohongshu. - Boundary markers: None identified. Content is passed directly to output formats (JSON/Excel) likely intended for LLM consumption.
- Capability inventory: The skill has broad capabilities including arbitrary network requests (
requestslibrary) and file system modification (openpyxl, media downloads). - Sanitization: There is no logic to filter or escape instructions embedded within the XHS content before it enters the agent's context.
- [CREDENTIALS_UNSAFE] (MEDIUM): The skill requires Xiaohongshu session cookies for authentication.
- Evidence: Instructions in
SKILL.mdand logic inxhs_full_cli.pyencourage passing session cookies via command-line arguments (--cookie) or environment files. This exposes sensitive credentials to shell history and process monitoring tools. - [COMMAND_EXECUTION] (MEDIUM): The skill utilizes dynamic execution of JavaScript assets.
- Evidence: The setup script
scripts/setup_env.shinstallspyexecjs, which is used to execute the bundled JavaScript inassets/js/for request signing. This execution of local assets, while functional, provides a vector for command execution if assets are tampered with. - [EXTERNAL_DOWNLOADS] (LOW): The setup process relies on external package repositories.
- Evidence:
scripts/setup_env.shperforms runtime installation of Python dependencies from PyPI and Node.js packages from npm. While these are standard sources, the reliance on remote assets during installation is noted.
Recommendations
- AI detected serious security threats
Audit Metadata