baoyu-post-to-wechat
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The file
scripts/md/utils/languages.tsuses dynamicimport()to load and execute JavaScript from an external CDN (cdn-doocs.oss-cn-shenzhen.aliyuncs.com) based on code block languages. This CDN is not in the trusted sources list, posing a risk of arbitrary code execution if the source is compromised. - COMMAND_EXECUTION (HIGH): The script
scripts/paste-from-clipboard.tsutilizesspawnSyncto execute dynamically generated AppleScript, PowerShell, and shell commands. These scripts are constructed via string templates at runtime, which is a dangerous pattern that can lead to command injection if inputs are manipulated. - DATA_EXFILTRATION (MEDIUM): The
markedPlantUMLextension inscripts/md/extensions/plantuml.tssends diagram source code to an external server (https://www.plantuml.com/plantuml) for rendering. This could lead to the exposure of sensitive information if included in user-provided diagrams. - EXTERNAL_DOWNLOADS (MEDIUM): The
md-to-wechat.tsscript contains adownloadFilefunction that fetches remote images from arbitrary URLs. This can be abused to perform Server-Side Request Forgery (SSRF) or download malicious assets. - PROMPT_INJECTION (HIGH): As an indirect prompt injection risk (Category 8), the skill ingests untrusted markdown data (
article.md) and possesses powerful capabilities including browser automation, network access, and system command execution viaspawnSync. There are no significant boundary markers or sanitization logic to prevent embedded instructions in the markdown from hijacking the agent's workflow.
Recommendations
- AI detected serious security threats
Audit Metadata