wechat-content-optimizer
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill instructions in
SKILL.mdrequire the execution of a local Node.js script (scripts/optimize.js). Executing shell commands based on user-provided input without strict validation is a security risk as the agent might pass unsanitized strings to the command line.\n- [DATA_EXFILTRATION] (MEDIUM): Thescripts/optimize.jsscript usesfs.readFileSyncto read file content and output it to the console for analysis. It does not validate that the provided path is a Markdown file or restricted to a specific directory, potentially allowing the exposure of sensitive files like.env, SSH keys, or configuration files to the LLM and its environment.\n- [PROMPT_INJECTION] (LOW): The skill is designed to process untrusted content from external files (Indirect Prompt Injection). While it uses delimiters to separate file content, it lacks explicit instructions for the AI to disregard commands found within that data.\n - Ingestion points: The
originalContentis read from user-provided file paths inscripts/optimize.js.\n - Boundary markers: Uses
---FILE_CONTENT_START---and---FILE_CONTENT_END---tags.\n - Capability inventory: File reading (
fs.readFileSync), shell execution (node), and requested file writing (saveOptimizedContentmentioned in instructions).\n - Sanitization: None. The content is passed directly to the LLM for optimization analysis.
Audit Metadata