baoyu-markdown-to-html
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill dynamically imports and executes JavaScript from a remote URL at runtime. Specifically,
scripts/md/utils/languages.tsusesimport()to fetch syntax highlighting grammars fromhttps://cdn-doocs.oss-cn-shenzhen.aliyuncs.com, which is an external and untrusted source.\n- [EXTERNAL_DOWNLOADS]: The skill performs arbitrary network requests viahttps.getinscripts/main.tsto download images specified in Markdown. This behavior can be exploited for Server-Side Request Forgery (SSRF) or to download malicious content to the local filesystem.\n- [COMMAND_EXECUTION]: The skill usesspawnSyncinscripts/main.tsto executenpx -y bun. This pattern of using package managers to run scripts can lead to the execution of untrusted code if the environment is not strictly controlled.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through the processing of untrusted markdown data.\n * Ingestion points: Input Markdown file read inscripts/main.ts.\n * Boundary markers: Absent; the content is parsed without delimiters or warnings.\n * Capability inventory: Subprocess execution (spawnSync) and file write operations (writeFile) inscripts/main.ts.\n * Sanitization: Absent; the skill does not sanitize the input markdown or validate remote URLs before processing.
Audit Metadata