wechat-publish
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [PROMPT_INJECTION]: The
publish_with_cover.jsscript contains an indirect prompt injection surface. It builds an image generation prompt using article metadata extracted from user-supplied files without sanitization. * Ingestion points: Title and digest extracted from files specified by--articleor--fileinpublish_with_cover.js. * Boundary markers: Absent; user content is concatenated directly with prompt instructions. * Capability inventory: Execution of external scripts viaspawnSync(image-gen.ts) which interfaces with image generation APIs. * Sanitization: Absent; no filtering or escaping of input content. - [EXTERNAL_DOWNLOADS]: The
wechat_draft.jsscript downloads images from URLs extracted from<img>tagsrcattributes in the input HTML. This behavior enables potential SSRF if the runtime environment has access to internal network resources. - [COMMAND_EXECUTION]: The
publish_with_cover.jsscript executes internal Node.js and Bun scripts usingchild_process.spawnSyncto perform image generation and uploading tasks. - [CREDENTIALS_UNSAFE]: The
loadEnvlogic in the scripts searches for.envfiles in parent directories up to three levels above the skill directory, potentially exposing sensitive environment variables from broader project contexts.
Audit Metadata