ticktick-cli
Warn
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
scripts/ticktick_cli.pyscript declares a dependency on 'httpxyz', a non-standard and relatively unknown library that shares a versioning scheme and name similarity with the popular 'httpx' library. This represents an unverifiable dependency and a potential supply chain risk. - [DATA_EXFILTRATION]: The
parse_checklist_itemsfunction inscripts/ticktick_cli.pyallows reading local files if the--item-jsonargument is prefixed with '@'. If an attacker can influence the inputs to the agent (e.g., through indirect prompt injection), they might trick the agent into reading sensitive files (like SSH keys or configuration files) and transmitting them to the TickTick API or revealing them in the conversation. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted data from the TickTick API and presents it to the agent.
- Ingestion points: Data retrieved from the API via
list_projects,get_task, andget_project_datainscripts/ticktick_api_client.pyis processed and displayed. - Boundary markers: None. Data from the API is displayed directly without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill has the ability to read local files (via the
@prefix), perform network requests to the TickTick API, and perform destructive actions likedelete_taskanddelete_project. - Sanitization: No sanitization or validation is performed on the content of tasks or projects retrieved from the API before they are processed by the agent.
- [COMMAND_EXECUTION]: The skill utilizes the
uv runmechanism to execute a local Python CLI. While the source code for the CLI and API client is provided, the execution environment involves downloading and running external packages and interacting with the local file system and network.
Audit Metadata