baoyu-format-markdown
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: In
scripts/autocorrect.ts, theapplyAutocorrectfunction usesexecSyncto run a shell command where thefilePathis interpolated directly:npx autocorrect-node --fix "${filePath}". This is vulnerable to shell command injection if the filename contains metacharacters such as backticks, semicolons, or dollar signs. - [EXTERNAL_DOWNLOADS]: The skill uses
npxto executeautocorrect-nodeandbunat runtime. Usingnpxwithout specific version tags causes the environment to download and run the latest version of these packages from the npm registry, which introduces an unverifiable third-party dependency risk. - [COMMAND_EXECUTION]: The
SKILL.mdfile defines a workflow that includes direct bash execution for file existence checks (test -f) and file manipulation (mv), which are executed in the agent's shell environment. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted user content for analysis and formatting.
- Ingestion points: Reads user-provided markdown or plain text files in Step 1.
- Boundary markers: None identified.
- Capability inventory: Includes subprocess execution via
execSyncinscripts/autocorrect.ts, file system modification viawriteFileSyncinscripts/main.ts, and shell operations inSKILL.md. - Sanitization: There is no sanitization or escaping of the ingested content or the resulting file paths before they are used in shell commands.
Recommendations
- AI detected serious security threats
Audit Metadata