xianyu-data-grabber

Fail

Audited by Snyk on Mar 29, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt instructs users to copy Gitee tokens and Xianyu cookies into a config file and shows examples that embed Authorization headers/credentials (e.g., curl -H "Authorization: Bearer YOUR_TOKEN"), which requires the agent to include secret values verbatim in commands/requests and thus creates an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's grabber scripts (grabber.js / grabber-enhanced.js) use Playwright to visit and scrape public listing pages on https://www.goofish.com/ (闲鱼) and then OCR/parse those user-generated pages, and those parsed results are used by recommend.py and upload/report workflows to drive decisions and actions—therefore it ingests untrusted third‑party content that can materially influence behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 29, 2026, 08:16 AM
Issues
3