canghe-post-to-x
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill documentation and check scripts suggest installing the Bun runtime using a piped shell command from
bun.sh. This is a well-known and trusted service within the developer community. - [EXTERNAL_DOWNLOADS]: The
md-to-html.tsscript programmatically downloads images from remote URLs provided within user-supplied Markdown files using the Node.jshttpsmodule to prepare content for article publishing. - [COMMAND_EXECUTION]: Multiple scripts utilize
spawnandspawnSyncto interact with system-level utilities for automation purposes: - Process Management: Uses
pkillandpgrepto manage existing Chrome/Chromium instances to ensure the automation port is available. - Keyboard Automation: Executes
osascript(macOS),powershell.exe(Windows), andxdotoolorydotool(Linux) to simulate Cmd+V or Ctrl+V keystrokes for pasting content into the browser. - Compiler Access: Uses the
swiftcompiler on macOS to dynamically execute small scripts for clipboard image handling via AppKit. - Clipboard Access: Calls
wl-copyandxclipon Linux to manage clipboard data. - [PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection as it processes untrusted Markdown data from the user which is then converted to HTML and pasted into a browser context.
- Ingestion points: Markdown files passed as arguments to
x-article.tsandmd-to-html.ts. - Boundary markers: No explicit delimiters or instructions are used to separate untrusted content from the agent's logic during interpolation.
- Capability inventory: The skill can read local files, download images from the web, and interact with the system clipboard and keyboard.
- Sanitization: Employs the
markedlibrary for parsing and includesescapeHtmlfunctions, though these are primarily for formatting rather than security-focused sanitization.
Audit Metadata