baoyu-post-to-x
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The file
scripts/paste-from-clipboard.tsis vulnerable to AppleScript injection on macOS. The--appparameter is used to build an AppleScript command string without sanitization. An attacker could craft a malicious application name containing quotes and newlines to execute arbitrary AppleScript, which in turn can execute shell commands via thedo shell scriptcommand or by interacting with other applications like Terminal.\n - Evidence: Functions
activateAppandpasteMacinscripts/paste-from-clipboard.tsinterpolate theappNamevariable directly into the script string:tell application \"${appName}\"without escaping.\n- COMMAND_EXECUTION (MEDIUM): The skill makes extensive use of OS-level automation tools (osascripton macOS,powershellon Windows,xdotoolon Linux) to perform actions like sending keystrokes. These tools are used to bypass browser automation detection but grant the skill the ability to interact with the host operating system outside the browser environment.\n- EXTERNAL_DOWNLOADS (LOW): The documentation and utility scripts frequently usenpx -y bun, which causes thebunruntime to be downloaded from the npm registry if it is not already available on the system. This introduces a runtime dependency on an external source.\n- CREDENTIALS_UNSAFE (MEDIUM): The skill stores sensitive browser data, including X.com session cookies, in a persistent user data directory (~/.local/share/x-browser-profile). While required for persisting logins and bypassing 2FA on every run, this directory represents a target for local data theft, as it contains full access credentials for the user's X account.\n- REMOTE_CODE_EXECUTION (MEDIUM): The skill documentation refers to several missing scripts (md-to-html.ts,copy-to-clipboard.ts) that handle content conversion and image downloading. The lack of visibility into these components, especially the logic for 'automatically downloading remote images' mentioned inreferences/articles.md, represents an unverified risk surface where additional vulnerabilities might exist.
Recommendations
- AI detected serious security threats
Audit Metadata