pw-post-to-wechat
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The skill dynamically imports JavaScript files from a remote, non-whitelisted CDN to support on-demand language highlighting.
- Evidence:
scripts/md/utils/languages.tsusesawait import()on URLs generated fromhttps://cdn-doocs.oss-cn-shenzhen.aliyuncs.com. This allows for arbitrary code execution if the CDN or the hosted files are compromised. - COMMAND_EXECUTION (HIGH): Multiple scripts utilize system-level command execution to perform rendering and automation tasks, including simulation of keyboard events which can be used to manipulate other applications.
- Evidence:
scripts/paste-from-clipboard.tsexecutesosascript(macOS),powershell.exe(Windows), andxdotool(Linux) to simulate system-wide 'Paste' keystrokes. - Evidence:
scripts/md-to-wechat.tsusesspawnSyncto executebunfor markdown rendering tasks. - EXTERNAL_DOWNLOADS (MEDIUM): The skill fetches content from arbitrary external web sources, which could lead to server-side request forgery (SSRF) or the ingestion of malicious assets.
- Evidence:
scripts/md-to-wechat.tsdownloads images from URLs extracted from user-provided markdown files using a customdownloadFilefunction. - DATA_EXFILTRATION (LOW): User-provided content is transmitted to external third-party services for processing.
- Evidence:
scripts/md/extensions/plantuml.tsencodes and sends diagram code tohttps://www.plantuml.comfor rendering, exposing potentially sensitive business logic contained in diagrams to the service provider.
Recommendations
- AI detected serious security threats
Audit Metadata