baoyu-post-to-x
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill provides the agent with a 'write' capability to a public platform while processing untrusted data. * Ingestion points: The skill accepts text through CLI arguments in
scripts/x-browser.tsand processes Markdown articles inscripts/x-article.ts. * Boundary markers: No delimiters or instructions are used to separate untrusted content from the agent's logic. * Capability inventory: Automates a real Chrome browser with persistent login sessions to post content. * Sanitization: WhileJSON.stringifyis used for safe browser-side text insertion, there is no validation or filtering of the content itself. - [Command Execution] (MEDIUM): Potential AppleScript injection in
scripts/paste-from-clipboard.ts. ThetargetAppparameter is directly interpolated into an AppleScript string (tell application \"${appName}\") without escaping or validation. An attacker controlling this parameter could execute arbitrary AppleScript code on macOS. - [Credential Safety] (LOW): The skill manages persistent Chrome profiles at
~/.local/share/x-browser-profile. These directories contain sensitive session cookies that could be targeted for exfiltration. - [Metadata/Missing Code] (LOW): Several referenced files (including
x-article.ts,md-to-html.ts, andcopy-to-clipboard.ts) are missing from the skill package, preventing a complete security verification of the article publishing workflow.
Recommendations
- AI detected serious security threats
Audit Metadata