reddit

Pass

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses child_process.exec to open the system's default web browser during the OAuth login flow. * Evidence: exec(${cmd} "${authUrl}") in scripts/reddit.mjs.
  • [DATA_EXFILTRATION]: The skill stores sensitive Reddit OAuth access and refresh tokens in a plaintext JSON file in the user's home directory. * Evidence: const TOKEN_FILE = join(homedir(), '.reddit-token.json') in scripts/reddit.mjs.
  • [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection as it fetches untrusted content (post titles, bodies, and comments) from the Reddit API and provides it to the agent. * Ingestion points: scripts/reddit.mjs fetches data from the Reddit API in getPosts, searchPosts, and getComments. * Boundary markers: Absent; content is formatted as JSON and printed directly. * Capability inventory: scripts/reddit.mjs has network access (fetch), file system access (fs), and command execution capabilities (exec). * Sanitization: Absent; content from Reddit is not escaped or filtered before output.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 10, 2026, 06:38 AM