md-to-zhihu
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/publish.pyexecutes system browser binaries (Chrome or Edge) usingsubprocess.Popenwith the--remote-debugging-portflag to enable automated interactions. - [CREDENTIALS_UNSAFE]: Authentication cookies are captured during the login process and stored in a local
.zhihu_cookies.jsonfile. A persistent browser profile is also created in the.zhihu_browser_profiledirectory. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of Playwright and its associated browser binaries from external repositories to function.
- [DATA_EXFILTRATION]: Local article content and authentication metadata are transmitted to Zhihu's official API endpoints and web services during the publishing workflow.
- [PROMPT_INJECTION]: The skill processes user-supplied Markdown files without sanitization, creating an indirect prompt injection surface. \n
- Ingestion points: Markdown files read by
convert.pyandpublish.py. \n - Boundary markers: None identified; content is processed without delimiters. \n
- Capability inventory: Local command execution, file system access, and network communication with Zhihu APIs. \n
- Sanitization: No validation or cleaning is performed on input Markdown before it is converted to HTML and submitted to the target platform.
Audit Metadata