baoyu-markdown-to-html
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
scripts/vendor/baoyu-md/src/utils/languages.tscontains logic to dynamically download and execute JavaScript language definitions from an external CDN (https://cdn-doocs.oss-cn-shenzhen.aliyuncs.com). It uses the dynamicimport()statement on a URL constructed using language names extracted from the user-provided Markdown content. - [EXTERNAL_DOWNLOADS]: The skill performs network requests to fetch remote content. Specifically,
scripts/vendor/baoyu-md/src/images.tsdownloads images from arbitrary URLs using a customdownloadFilefunction, andscripts/vendor/baoyu-md/src/extensions/plantuml.tsfetches SVG content from a PlantUML server. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted Markdown data and renders it into a structured HTML output without explicit boundary markers (e.g., delimiters or safety instructions) to prevent the AI agent from obeying instructions embedded in the document. Evidence of this ingestion surface is found in
scripts/vendor/baoyu-md/src/renderer.ts.
Recommendations
- AI detected serious security threats
Audit Metadata