baoyu-format-markdown
Fail
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/autocorrect.tsusesexecSyncto run a shell command where thefilePathvariable is interpolated directly into the string. This vulnerability allows for arbitrary command execution if a file path contains shell expansions like$(command)or backticks, even when the path is double-quoted. - [EXTERNAL_DOWNLOADS]: The skill's workflow and scripts utilize
npxto dynamically download and execute theautocorrect-nodepackage and run TypeScript scripts via Bun at runtime. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it processes untrusted user-supplied markdown and text files.
- Ingestion points: Reads content from user-specified text or markdown files in the initial workflow step.
- Boundary markers: There are no delimiters or instructions used to isolate user-supplied content from the agent's internal reasoning during analysis or formatting.
- Capability inventory: The skill possesses file system access (read/write/rename) and the ability to execute shell commands through the typography scripts.
- Sanitization: No sanitization or validation is applied to user-provided file content or generated file paths before use in shell operations.
Recommendations
- AI detected serious security threats
Audit Metadata