baoyu-post-to-weibo
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
osascript(macOS),powershell.exe(Windows), andxdotool/ydotool(Linux) to automate user interface actions such as clipboard manipulation and keyboard event simulation to bypass bot detection. - [REMOTE_CODE_EXECUTION]: The
baoyu-mdvendor component dynamically imports JavaScript modules from an external CDN (cdn-doocs.oss-cn-shenzhen.aliyuncs.com) to support syntax highlighting for various programming languages during markdown rendering. - [EXTERNAL_DOWNLOADS]: The skill automatically downloads images from remote URLs specified in markdown files to a temporary directory using the
httpandhttpsmodules. - [COMMAND_EXECUTION]: Identifies and terminates existing browser processes using
ps auxandpkillcommands to manage Chrome/Chromium debug instances. - [COMMAND_EXECUTION]: Generates and executes a temporary Swift script on macOS to bridge JavaScript data to the system clipboard for rich text and image support.
Audit Metadata