liubin-post-to-weibo
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): Command injection vulnerability in
scripts/paste-from-clipboard.tsvia macOS AppleScript. - Evidence: In the
activateAppandpasteMacfunctions, thetargetAppvariable (derived from the--appCLI argument) is directly interpolated into a string used forosascript -e. - Code Path:
const script = \tell application "${appName}" ...`; spawnSync('osascript', ['-e', script], { stdio: 'pipe' });` - Impact: An attacker or malicious prompt could provide a payload like
Finder" to do shell script "[malicious command]" --to execute arbitrary shell scripts on the host machine. - COMMAND_EXECUTION (MEDIUM): Use of high-privilege system automation tools.
- The skill executes
powershell.exeon Windows,osascripton macOS, andxdotool/ydotoolon Linux to simulate global keystrokes (Ctrl+V/Cmd+V). - These tools have the capability to interact with any application currently running on the user's desktop, which could be leveraged to leak data or perform actions in sensitive applications (e.g., terminal, password managers) if the system focus is manipulated.
- DATA_EXFILTRATION (LOW): Interaction with system clipboard.
- The script specifically targets the system clipboard. While intended for 'pasting' content into Weibo, the capability to trigger paste events can be used to move sensitive data from the clipboard into a browser context where it might be intercepted or exfiltrated.
- REMOTE_CODE_EXECUTION (MEDIUM): Dynamic configuration via
EXTEND.md. SKILL.mdspecifies that it loadsEXTEND.mdfrom hidden directories (~/.liubin-skills/) and that this content "overrides defaults." This creates a mechanism for persistence or behavior modification if an attacker gains the ability to write to these local paths.
Recommendations
- AI detected serious security threats
Audit Metadata