baoyu-post-to-x
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]:
scripts/copy-to-clipboard.tscontains agetMacSwiftClipboardSourcefunction that stores raw Swift source code as a string. At runtime, this code is written to a temporary file and executed using the system'sswiftinterpreter to interact with the macOS clipboard. - [EXTERNAL_DOWNLOADS]: The
scripts/md-to-html.tsscript contains adownloadFilefunction that uses thehttpandhttpsmodules to fetch remote files from URLs found within processed Markdown documents. It uses a generic browser User-Agent to avoid being blocked. - [COMMAND_EXECUTION]: Multiple scripts (
scripts/paste-from-clipboard.ts,scripts/copy-to-clipboard.ts) construct and execute shell commands usingnode:child_process. This includes running AppleScript viaosascripton macOS and PowerShell scripts on Windows to simulate real user keyboard events like 'Cmd+V' or 'Ctrl+V'. - [COMMAND_EXECUTION]: The skill launches the Google Chrome browser with the
--remote-debugging-portand--disable-blink-features=AutomationControlledflags. This allows the scripts to maintain full programmatic control over a real browser session, including access to persistent user cookies and session data. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface in
scripts/md-to-html.ts. It parses untrusted Markdown content from external files and automatically processes embedded links and images, which could be used to trigger unwanted network requests or data ingestion without explicit user confirmation.
Audit Metadata