baoyu-post-to-weibo

Pass

Audited by Gen Agent Trust Hub on Apr 20, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses various system utilities to facilitate browser automation and cross-platform compatibility.
  • It executes osascript (macOS), powershell.exe (Windows), and xclip/wl-copy (Linux) for clipboard management.
  • It dynamically generates and executes Swift code on macOS via the swift interpreter to handle rich text and image clipboard data.
  • It simulates physical keystrokes (Cmd+V/Ctrl+V) using osascript, powershell, or xdotool to ensure content is correctly pasted into the Weibo editor, bypassing synthetic event blocks.
  • It controls the browser using the Chrome DevTools Protocol, which involves executing JavaScript commands within the browser context via Runtime.evaluate.
  • It includes logic to identify and terminate specific Chrome processes (using ps and kill) associated with the skill's profile to resolve connection issues.
  • [EXTERNAL_DOWNLOADS]: The skill utilizes package managers and well-known runtimes to manage its environment.
  • It uses npx -y bun to execute scripts, which may involve downloading the Bun runtime if it is not present.
  • It specifies dependencies on libraries baoyu-chrome-cdp and baoyu-md, which are vendor-provided resources for browser automation and Markdown processing.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 20, 2026, 05:49 AM