baoyu-post-to-x
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches the
bunruntime installer from the officialbun.shdomain and downloads images from remote URLs specified in Markdown articles during the conversion process. - [REMOTE_CODE_EXECUTION]: Recommends installing the Bun runtime by piping a script from
https://bun.sh/installdirectly to the shell (bash). - [COMMAND_EXECUTION]: Spawns browser processes (Chrome/Chromium) and uses platform-specific automation tools—
osascripton macOS,PowerShellon Windows, andxdotool/ydotoolon Linux—to perform clipboard operations and simulate keystrokes. - [DATA_EXFILTRATION]: Accesses the user's local Chrome profile directory and user home directory to manage session persistence and configuration, which is necessary for bypassing X's anti-bot measures.
- [PROMPT_INJECTION]: Processes Markdown files (e.g., in
md-to-html.ts) that could contain instructions intended to influence the agent's behavior during content conversion or posting, representing an indirect prompt injection surface.
Audit Metadata