baoyu-post-to-wechat
Warn
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
scripts/md/utils/languages.tsdynamically imports and executes JavaScript fromhttps://cdn-doocs.oss-cn-shenzhen.aliyuncs.comusing theimport()function to load syntax highlighting definitions at runtime. - [EXTERNAL_DOWNLOADS]:
scripts/md-to-wechat.tsimplements adownloadFilefunction that uses the Node.jshttpandhttpsmodules to fetch images from arbitrary remote URLs defined in Markdown documents. - [COMMAND_EXECUTION]: Multiple scripts, including
scripts/copy-to-clipboard.tsandscripts/paste-from-clipboard.ts, execute platform-specific system utilities such asosascript,powershell.exe,xclip,xdotool, andswiftto manipulate the system clipboard and simulate keystrokes (Command+V/Ctrl+V). - [COMMAND_EXECUTION]: The automation engine in
scripts/cdp.tsandscripts/wechat-browser.tsspawns the Chrome browser with debugging flags (--remote-debugging-port) and uses the Chrome DevTools Protocol to programmatically control browser behavior. - [REMOTE_CODE_EXECUTION]: The skill uses the
Runtime.evaluatecommand within the Chrome DevTools Protocol to execute arbitrary JavaScript in the context of the target web pages for automation purposes.
Audit Metadata