baoyu-format-markdown
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): In scripts/autocorrect.ts, the filePath variable is directly interpolated into a shell command string passed to execSync. This allows for arbitrary command execution if a file is given a malicious name containing shell metacharacters like $(command) or backticks. Evidence: execSync(
npx autocorrect-node --fix "${filePath}") in scripts/autocorrect.ts. - EXTERNAL_DOWNLOADS (MEDIUM): The script uses npx to download and execute the autocorrect-node package from the public npm registry at runtime, which introduces a supply chain risk as the version is not pinned and the source is external. Evidence: npx call in scripts/autocorrect.ts.
- PROMPT_INJECTION (LOW): The skill is vulnerable to indirect prompt injection because it reads untrusted data from files and possesses powerful execution and file-write capabilities without implementing boundary markers or sanitization for the processed content. Evidence Chain: Ingestion points: scripts/main.ts (readFileSync); Boundary markers: absent; Capability inventory: execSync (scripts/autocorrect.ts), writeFileSync (scripts/main.ts); Sanitization: absent.
Recommendations
- AI detected serious security threats
Audit Metadata