crawl-xueqiu-my-timeline
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The setup script
check-agent-browser.shperforms a global installation of theagent-browserpackage from a public NPM registry. - [EXTERNAL_DOWNLOADS]: The skill uses
bunxin the PDF generation workflow, which downloads and executes themdpdfpackage from the NPM registry at runtime. - [COMMAND_EXECUTION]: The
check-cdp.shscript usespkillto terminate existingGoogle Chromeprocesses, which is an intrusive operation used to restart the browser in debug mode. - [COMMAND_EXECUTION]: The Python crawling script uses
subprocess.runto invoke theagent-browserCLI, passing it dynamically constructed JavaScript code for execution within the browser context. - [PROMPT_INJECTION]: The skill ingests and processes timeline data from the Xueqiu platform. Since this data is generated by external users and later analyzed by AI subagents, it serves as an entry point for indirect prompt injection attacks.
Audit Metadata