xhs
Fail
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The
install.shandxhs-toolkit/install_deps.pyfiles contain a command that downloads a script from an untrusted external URL and pipes it directly into the shell for execution (curl -LsSf https://astral.sh/uv/install.sh | sh). This allows the remote server to execute arbitrary code on the host system without verification. - COMMAND_EXECUTION (HIGH): The
xhs-toolkit/install.shscript executes commands with elevated privileges usingsudo apt-get install. This is a high-risk operation that could lead to unauthorized system modifications. - CREDENTIALS_UNSAFE (HIGH): The skill prompts for and stores an OpenRouter API key in the agent's global configuration file (
~/.openclaw/openclaw.json). Additionally, it extracts and stores Xiaohongshu session cookies in a local JSON file (~/.openclaw/credentials/xhs_cookies.json). Exposure or theft of this file would lead to complete account takeover. - DATA_EXFILTRATION (MEDIUM): The
src/utils/image_processor.pyscript includes functionality to download images from arbitrary URLs provided in user inputs usingaiohttp. While intended for content generation, this network capability could be abused to perform Server-Side Request Forgery (SSRF) or communicate with malicious endpoints. - PROMPT_INJECTION (LOW): The
SKILL.mdfile contains instructional overrides ('IMPORTANT: All Xiaohongshu operations must use exec tool... do not use browser tool') that dictate the agent's tool selection, potentially bypassing safety features of the browser tool in favor of direct script execution. - INDIRECT_PROMPT_INJECTION (LOW): The skill possesses a significant attack surface for indirect injection.
- Ingestion points:
XHSDataCollectorinsrc/xiaohongshu/data_collector/dashboard.pyandfans.pyscrapes trending topics and user comments from the web. - Boundary markers: None detected in the script logic; external data is processed directly.
- Capability inventory: The skill uses
seleniumviaXHSPublisherto post content and theexectool to run Python scripts. - Sanitization: No sanitization or filtering of scraped web content is performed before it is passed to the AI for 'trending' analysis or content generation.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata