baoyu-post-to-wechat
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill includes patterns for executing remote code from unverified sources.
- The
SKILL.mdandscripts/check-permissions.tsfiles suggest the commandcurl -fsSL https://bun.sh/install | bashfor environment setup. scripts/md/utils/languages.tsuses dynamicimport()to fetch and execute syntax highlighting logic fromhttps://cdn-doocs.oss-cn-shenzhen.aliyuncs.com/npm/highlightjs/11.11.1/es/languages/.- [COMMAND_EXECUTION]: The skill makes extensive use of subprocesses to interact with the host operating system.
- It spawns
swiftscripts for clipboard management on macOS. - It uses
osascriptfor UI automation and permission checks on macOS. - It uses
powershell.exefor clipboard and keystroke simulation on Windows. - It relies on external CLI utilities like
agent-browser,xdotool, andydotool. - [CREDENTIALS_UNSAFE]: The skill manages sensitive WeChat API credentials.
scripts/wechat-api.tsprovides logic to prompt the user forWECHAT_APP_IDandWECHAT_APP_SECRETand store them in.envfiles in the project or home directory.- [EXTERNAL_DOWNLOADS]: The skill fetches content from remote URLs during its operation.
scripts/md-to-wechat.tsautomatically downloads images referenced by URL in input Markdown files to a local temporary directory.- [PROMPT_INJECTION]: The skill processes untrusted input files which creates a surface for indirect injection.
- Markdown and HTML files are parsed and their content is interpolated into browser automation scripts in
scripts/wechat-article.tsandscripts/wechat-browser.tswithout sufficient sanitization or boundary delimiters.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
Audit Metadata