md-to-wechat
Pass
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes external Markdown content that may contain malicious instructions.
- Ingestion points: The
md_to_wechat.pyscript (line 301) reads Markdown content from a file path provided via the command-line arguments. - Boundary markers: No delimiters or isolation instructions are present to prevent the agent from interpreting instructions embedded within the Markdown data.
- Capability inventory: The skill includes file-writing capabilities as its primary function, which can be directed to any path the agent can access.
- Sanitization: The script performs basic HTML escaping for content within code blocks but does not sanitize or filter the main body of the Markdown text for potential agent-directed commands.
- [COMMAND_EXECUTION]: The skill allows specifying an arbitrary output file path via the command line, which could lead to unauthorized file overwriting.
- Evidence: The
-o/--outputargument inmd_to_wechat.py(line 332) is passed directly to theopen()function (line 319) without verifying that the destination path is restricted to a safe directory or validated against expected filenames.
Audit Metadata