baoyu-danger-x-to-markdown
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
scripts/constants.tscontains a hardcodedDEFAULT_BEARER_TOKEN. While this is a known token for the X web client, hardcoding credentials in the skill source is an unsafe practice. - [COMMAND_EXECUTION]: The skill executes external commands for essential functionality, which increases the potential attack surface.
- Evidence:
scripts/cookies.tsusesspawnto launch Google Chrome for the purpose of automated cookie extraction. - Evidence:
scripts/paths.tsusesexecSyncto runcmd.exefor resolving Windows home paths in WSL environments. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data from an external social platform.
- Ingestion points: Untrusted content is fetched from X in
scripts/graphql.tsandscripts/thread.ts. - Boundary markers: Content is formatted into markdown without specific delimiters or instructions for the agent to ignore embedded commands.
- Capability inventory: The skill has the ability to write files (
scripts/main.ts) and execute shell commands (scripts/cookies.ts). - Sanitization: There is no logic present to sanitize or escape potentially malicious instructions embedded in the tweet or article content.
Audit Metadata