baoyu-post-to-wechat
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill dynamically downloads and executes JavaScript from an untrusted remote CDN, which could allow for arbitrary code execution if the CDN is compromised.\n
- Evidence: In
scripts/md/utils/languages.ts, theloadAndRegisterLanguagefunction uses theimport()function to load code fromhttps://cdn-doocs.oss-cn-shenzhen.aliyuncs.com/npm/highlightjs/....\n- [DATA_EXFILTRATION] (HIGH): The skill can be coerced into reading and exposing sensitive local files by processing them as markdown image attachments.\n - Evidence: In
scripts/md-to-wechat.ts, theresolveImagePathfunction resolves absolute local file paths provided in the markdown source. These files are then read and prepared for publication (pasted via the clipboard) in the WeChat editor.\n- [COMMAND_EXECUTION] (MEDIUM): The skill executes platform-specific shell commands to control the host system and simulate user keystrokes.\n - Evidence:
scripts/paste-from-clipboard.tsexecutesosascript(macOS),powershell.exe(Windows), andxdotool(Linux).scripts/md-to-wechat.tsexecutesnpx -y bunto run rendering scripts.\n- [EXTERNAL_DOWNLOADS] (LOW): The skill automatically fetches remote image assets found in markdown content.\n - Evidence:
scripts/md-to-wechat.tsuses adownloadFilefunction to fetch content from arbitrary URLs.
Recommendations
- AI detected serious security threats
Audit Metadata