jiucai-capture
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection. It retrieves article titles and content from the external website 'jiuyangongshe.com' and interpolates them directly into LLM prompts in
a_stock_watcher/ai_parser.py(usingPARSE_PROMPTandIMAGE_PARSE_PROMPT). - Ingestion points: Data is ingested via Playwright scrapers in
a_stock_watcher/sources/which target community-contributed articles. - Boundary markers: There are no boundary markers or instructions to ignore embedded commands within the ingested content.
- Capability inventory: The skill has significant capabilities including file system access (SQLite DB and session storage), network access (scraping), and the ability to execute Bash commands via
uvandpython3as defined inallowed-tools. - Sanitization: No sanitization or filtering is performed on the scraped text before it is sent to the Gemini AI model.
- [COMMAND_EXECUTION]: The skill requires the ability to execute various shell commands to manage its environment and run its logic.
SKILL.mdspecifiesallowed-toolsforBash(uv:*),Bash(python3:*), andBash(gemini:*). While necessary for the skill's function (e.g.,uv sync,playwright install), this provides a broad execution surface that could be exploited if the agent is compromised via prompt injection. - [CREDENTIALS_UNSAFE]: The skill manages sensitive information including
JIUCAI_PHONE,JIUCAI_PASSWORD, andGEMINI_API_KEY. Thea_stock_watcher/auth.pyscript automates the login process and stores session cookies indata/auth_state.json. While this is part of the intended functionality for a scraping tool, the handling of plaintext credentials in.envfiles and the storage of session states increases the risk profile if the local environment is accessed.
Audit Metadata