harmonyos-app
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Automated scanners identified two malicious URLs within the documentation:
https://short.link/abc123andhttps://short.link/abc. - Evidence: These URLs are found in
component/qrcode/qrcode.mdwithin code examples demonstrating the creation of QR codes using shortened links. Although they serve as placeholders in documentation, the domains are blacklisted and could pose a risk if used in live applications. - [PROMPT_INJECTION]: The skill documents components that establish a vulnerability surface for indirect prompt injection (Category 8).
- Ingestion points: The
TextInputandTextAreacomponents, detailed incomponent/text_input/text_input.mdandcomponent/text_area/text_area.md, are points where untrusted user data enters the application context. - Boundary markers: The provided code examples for handling these inputs do not utilize delimiters or specific instructions to the agent to disregard embedded commands.
- Capability inventory: The skill provides instructions for high-privilege capabilities including making system calls (
reference/harmonyos_call_6.0.skill.md), accessing system contacts (reference/harmonyos_contacts_6.0.skill.md), and executing JavaScript within a Web view (component/web/web.md). - Sanitization: The example snippets lack explicit sanitization or validation logic to protect against malicious instructions embedded in user-provided text.
- [COMMAND_EXECUTION]: No evidence of unauthorized command execution or shell injection was detected. The build and compilation commands (
hvigorw) mentioned inSKILL.mdare standard developer tools used legitimately for the skill's primary purpose. - [DATA_EXFILTRATION]: No hardcoded credentials or unauthorized data transmission logic was found. The skill follows the standard HarmonyOS permission model for accessing sensitive data like contacts and call functions.
Recommendations
- Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata