baoyu-markdown-to-html
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
scripts/md/utils/languages.tsdynamically generates URLs to a third-party CDN (cdn-doocs.oss-cn-shenzhen.aliyuncs.com) and uses theimport()function to execute JavaScript code. The specific script loaded is determined by the language identifier used in Markdown code blocks, allowing external content to trigger the execution of remote code not verified by the skill. - [EXTERNAL_DOWNLOADS]: The skill's main script (
scripts/main.ts) contains adownloadFilefunction that uses thehttpandhttpsmodules to fetch remote images found in Markdown files. This can be exploited for tracking the agent's environment or for performing Server-Side Request Forgery (SSRF) attacks. - [COMMAND_EXECUTION]: The script
scripts/main.tsusesspawnSyncto executenpxcommands. While intended to run the internal rendering process, this execution pattern relies on the externalnpxenvironment and may trigger automatic downloads of packages at runtime. - [REMOTE_CODE_EXECUTION]: The
scripts/md/extensions/plantuml.tsandscripts/md/extensions/infographic.tscomponents transmit user-provided diagram code to external rendering services (e.g., PlantUML servers) and dynamically import libraries like@antv/infographic, creating additional vectors for remote data processing and code execution. - [DATA_EXPOSURE]: The skill processes user-provided file paths directly. If an agent is manipulated into running the skill on sensitive system files, the content will be converted to HTML and potentially exposed to the user or external services during rendering.
Recommendations
- AI detected serious security threats
Audit Metadata