baoyu-post-to-x
Pass
Audited by Gen Agent Trust Hub on Apr 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted Markdown content and image paths provided by the user.
- Ingestion points:
scripts/x-article.tsandscripts/md-to-html.tsread content from external files provided via CLI arguments. - Boundary markers: The skill does not use specific delimiters to isolate user-provided content from instructions.
- Capability inventory: The skill can control a browser via CDP, perform network downloads, and execute system commands.
- Sanitization: It uses established libraries like
markedandunifiedfor markdown processing and applies basic HTML escaping. - [DYNAMIC_EXECUTION]: On macOS, the skill dynamically generates Swift code strings from templates, writes them to temporary files, and executes them to manage system pasteboard operations.
- Evidence: Found in
scripts/copy-to-clipboard.tsandscripts/check-paste-permissions.ts. - [COMMAND_EXECUTION]: The skill executes various system-level utilities to interact with the OS and bypass browser automation detection. This includes
osascript(macOS),powershell.exe(Windows),xdotoolorydotool(Linux), andpsfor process monitoring. - Evidence: Found in
scripts/paste-from-clipboard.ts,scripts/copy-to-clipboard.ts, andscripts/x-utils.ts. - [EXTERNAL_DOWNLOADS]: The skill performs network operations to download remote images from HTTPS URLs specified within processed Markdown files.
- Evidence: Found in
scripts/md-to-html.tsvia thedownloadFilefunction using thehttpsmodule.
Audit Metadata