baoyu-markdown-to-html
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/md/utils/languages.tsdynamically imports JavaScript modules from an external Aliyun OSS bucket (cdn-doocs.oss-cn-shenzhen.aliyuncs.com) using theimport()function with computed URLs. This is used to load language definitions for syntax highlighting at runtime. - [EXTERNAL_DOWNLOADS]: The main execution script
scripts/main.tscontains adownloadFilefunction that uses thehttpandhttpsmodules to fetch content from arbitrary URLs and save it to the local file system. This is triggered when processing Markdown files containing remote image links. - [COMMAND_EXECUTION]: The instruction set in
SKILL.mddirects the agent to usenpx -y bunto run the conversion scripts. This involves executing packages fetched from the public NPM registry. - [DATA_EXPOSURE]: The skill is designed to read configuration and preference files (
EXTEND.md) from the user's home directory and from other skill directories (specificallybaoyu-post-to-wechat), as seen in the theme resolution logic inSKILL.mdandscripts/md/extend-config.ts. - [PROMPT_INJECTION]: The skill acts as a surface for indirect prompt injection because it processes untrusted Markdown content and generates HTML output for downstream platforms without explicit sanitization or boundary markers to differentiate between data and instructions. Evidence:
scripts/main.tsreads the input file, andscripts/md/renderer.tsuses themarkedlibrary with custom extensions to produce the final HTML structure.
Audit Metadata