xiaohongshu-mcp
Fail
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The files
cookies.jsonanddata/cookies.jsoncontain active, hardcoded session cookies (includingweb_sessionandid_token) forxiaohongshu.com. These credentials provide full authenticated access to the associated user account. - [REMOTE_CODE_EXECUTION]: The
install.shscript downloads binary executables from an external repository (github.com/xpzouying/xiaohongshu-mcp) and executes them locally. It also suggests a 'curl | bash' installation pattern which is a high-risk remote code execution vector. - [COMMAND_EXECUTION]: Multiple scripts (
xhs_client.py,xhs_mcp.py) use thesubprocessandos.systemmodules to execute local binaries and external messaging tools for browser automation and notifications. - [PROMPT_INJECTION]: The skill's operational strategy (
STRATEGY.md) contains instructions for the agent to adopt an aggressive 'debater' persona. It specifically directs the agent to 'firmly refute' and 'slap in the face' users who disagree with its posts, attempting to override neutral safety guidelines. - [EXTERNAL_DOWNLOADS]: In addition to binary downloads, the skill dynamically fetches images from
source.unsplash.combased on content keywords. - [DATA_EXFILTRATION]: The automated login script
scripts/xhs_login_sop.pycaptures screenshots of sensitive QR codes and transmits them to a specific external Feishu (Lark) user ID using theopenclaw messagetool. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted external content from social media comments to generate automated replies.
- Ingestion points:
scripts/xhs_client.pyandscripts/xhs_mcp.pyfetch feed details and user comment lists. - Boundary markers: Absent; untrusted content is interpolated directly into prompts.
- Capability inventory: The skill has the capability to read account data, publish new content, and post replies.
- Sanitization: No validation or filtering of external comment text is evident before processing.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/tclawde/xiaohongshu-mcp-skill/main/install.sh, http://localhost:18060 - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata