xhs-publisher
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
publish_xhs.shuses theevalcommand to construct and execute the file upload command for the browser automation tool. - Evidence: Line 139:
eval "$AB upload \"input.upload-input\" $UPLOAD_FILES". Usingevalon variables that can be influenced by input arguments is a known risk for shell command injection if file paths or arguments are crafted maliciously. - [PROMPT_INJECTION]: The skill acts as a surface for indirect prompt injection because it ingests external data and possesses the capability to interact with social media platforms.
- Ingestion points: Data enters the script via the
-t(title) and-c/-f(content) parameters inpublish_xhs.sh. - Boundary markers: No specific delimiters or instructions are used to prevent the agent from interpreting instructions contained within the user-provided title or content.
- Capability inventory: The skill utilizes
agent-browserto perform actions in a web browser, including navigating to the creator portal and clicking the publish button. - Sanitization: The script includes a robust sanitization step using
python3andjson.dumps(lines 173-178 and 195-214) to escape the title and content strings before they are injected into the browser's JavaScript environment, which prevents Cross-Site Scripting (XSS) and JavaScript injection.
Audit Metadata