siyuan-markdown
Warn
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides a Python script
scripts/insert_image.pyand instructs the agent to execute it via shell command to insert images into documents. - [DATA_EXFILTRATION]: The script
scripts/insert_image.pyreads a sensitiveapi_tokenfrom a localsiyuan.jsonconfiguration file and transmits it via HTTP headers to an API endpoint. This creates a risk of credential exposure if the target URL is redirected or if the environment is shared. - [PROMPT_INJECTION]: The script
scripts/insert_image.pyis vulnerable to injection attacks due to a lack of input sanitization. - Ingestion points:
sys.argv[1](doc_title) andsys.argv[3](caption) inscripts/insert_image.py. - Boundary markers: None used for SQL or Markdown construction.
- Capability inventory: Executes SQL queries (
api/query/sql) and appends blocks (api/block/appendBlock) via the SiYuan API using therequestslibrary. - Sanitization: None; the script uses f-strings to directly interpolate user-controlled variables into SQL statements and Markdown strings, allowing for SQL injection and Markdown structure bypass.
Audit Metadata