yuque-lakebook-export
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script uses
os.system()to open the output folder after conversion inscripts/yuque_lakebook_export/lake_setup.py. Theoutput_pathis concatenated directly into shell commands likeopenorexplorerwithout sanitization. If the output path (derived from user input or filenames in the input file) contains shell metacharacters, it could lead to arbitrary command execution on the host system. - [REMOTE_CODE_EXECUTION]: In
scripts/yuque_lakebook_export/lake_setup.py, theload_meta_jsonfunction usesyaml.load(book_yml, yaml.Loader)to parse Table of Contents data from the input files. Usingyaml.Loaderinstead ofyaml.SafeLoaderis insecure as it allows the instantiation of arbitrary Python objects, which a malicious.lakebookfile could use to execute code during the conversion process. - [EXTERNAL_DOWNLOADS]: The skill uses the
requestslibrary inscripts/yuque_lakebook_export/lake_handle.pyto download images and attachments from remote URLs extracted from the processed documents. This functionality is part of the skill's primary purpose but depends on the integrity of the input files.
Recommendations
- AI detected serious security threats
Audit Metadata