md2wechat
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The script
scripts/run.shdownloads a platform-specific binary from an untrusted GitHub repository and executes it usingexec. This allows the downloaded code to run with the full permissions of the AI agent. - Evidence:
scripts/run.sh(lines 79-93) implementsdownload_binaryfromgithub.com/geekjourneyx/md2wechat-skilland line 152 executes it. - [EXTERNAL_DOWNLOADS] (HIGH): The skill uses
curlorwgetto fetch executable files from a non-whitelisted external domain at runtime. - Evidence: URL
https://github.com/geekjourneyx/md2wechat-skill/releases/download/v1.10.0/is used to pull binaries for Darwin, Linux, and Windows. - [COMMAND_EXECUTION] (MEDIUM): The skill provides a wrapper script (
scripts/run.sh) that facilitates the execution of the downloaded binary with arbitrary arguments provided by the agent or user. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill processes external Markdown files (e.g.,
article.md) which could contain malicious instructions designed to influence the behavior of themd2wechatbinary or the subsequent agent actions. - Ingestion points: Arguments passed to
write,convert, andhumanizecommands viascripts/run.sh. - Boundary markers: None identified in the script or documentation for separating untrusted data from processing logic.
- Capability inventory: Subprocess execution via
execinscripts/run.shand network operations for image uploading. - Sanitization: No sanitization logic is visible in the provided shell script; logic resides in the opaque binary.
Recommendations
- AI detected serious security threats
Audit Metadata