tuzi-markdown-to-html
Warn
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/md/utils/languages.tsdynamically imports JavaScript modules from a remote CDN (cdn-doocs.oss-cn-shenzhen.aliyuncs.com) using theimport()function. The URL is constructed using thelanguageidentifier from the Markdown code block, enabling dynamic loading of executable code based on untrusted input. - [EXTERNAL_DOWNLOADS]: The
downloadFilefunction inscripts/main.tsfetches and saves files from arbitrary HTTP/HTTPS URLs specified in the Markdown images (). These files are stored in a temporary directory on the local filesystem. - [PROMPT_INJECTION]: The skill acts as an indirect prompt injection surface by converting untrusted Markdown into HTML without performing any sanitization. Maliciously crafted Markdown can embed
<script>or<style>tags that will be included in the final HTML document, posing a risk if the output is rendered in a web environment. - [REMOTE_CODE_EXECUTION]: The skill attempts to dynamically import several libraries such as
mermaidand@antv/infographicthat are not listed as dependencies in thepackage.jsonfile, which may lead to runtime errors or unexpected behavior if the environment contains different versions of these packages. - [DATA_EXFILTRATION]: The generated HTML output exposes local absolute file paths in
data-local-pathattributes for downloaded images, potentially leaking information about the host environment's directory structure.
Audit Metadata