xiaohongshu-search-summarizer
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes untrusted data from an external social media platform.
- Ingestion points: User-generated content (titles, descriptions, and comments) from Xiaohongshu is scraped and written to a raw markdown file via
scripts/parse.pyandscripts/run.sh. - Boundary markers: The skill does not implement clear delimiters or instructions to the agent to ignore potentially malicious commands embedded in the scraped data.
- Capability inventory: The skill utilizes subprocess execution for scraping (
playwright-cli) and image processing (python3), and the agent is explicitly instructed to read, see (via vision), and analyze the processed data. - Sanitization: While
scripts/parse.pyperforms basic string cleaning for display, it does not sanitize the input against markdown injection or instructional text. - [EXTERNAL_DOWNLOADS]: The skill performs automated downloads of media files from external servers.
- Evidence: The
scripts/parse.pyscript uses therequestslibrary to fetch image files from URLs discovered during the scraping process (requests.get(img_url, ...)). - [COMMAND_EXECUTION]: The skill executes local CLI tools and generates temporary script files to facilitate web scraping.
- Evidence: The
scripts/run.shscript creates a temporary JavaScript file in/tmp/and executes it usingplaywright-cli run-code. It also invokespython3to run the parsing script.
Audit Metadata