crawl-xueqiu-user-timeline
Warn
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/check-cdp.shusespkill -f "Google Chrome"andpkill -9to forcibly terminate existing browser processes. This is an invasive operation that can lead to data loss in unrelated user browser sessions. - [EXTERNAL_DOWNLOADS]: The setup script
scripts/check-agent-browser.shinstalls theagent-browserpackage globally (npm install -g) from a remote registry. While it uses a well-known mirror, global installation of third-party tools increases the system's attack surface. - [COMMAND_EXECUTION]: The main Python script
scripts/crawl_xueqiu_user_timeline_api.pyusessubprocess.runto execute CLI commands and evaluates dynamic JavaScript strings within the browser context via theagent-browsertool. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it scrapes untrusted user-generated content from Xueqiu and explicitly recommends subsequent AI analysis of this data.
- Ingestion points:
scripts/crawl_xueqiu_user_timeline_api.pyfetches post content, user descriptions, and interaction data fromxueqiu.com. - Boundary markers: Absent. Scraped data is saved directly to Markdown without delimiters or instructions for the AI to ignore embedded commands.
- Capability inventory: The skill possesses the ability to execute subprocesses, evaluate browser-side JavaScript, and write files to the local system.
- Sanitization: The script performs basic HTML tag removal and entity replacement, which is insufficient to prevent instructions embedded in text from influencing a downstream LLM.
Audit Metadata