buaa-classroom-summarizer
Fail
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]:
scripts/extract_buaa_classroom.pyaccesses sensitive browser storage files to harvest session data. It identifies and reads theCookiesdatabase andLocal Stateconfiguration files for both Microsoft Edge and Google Chrome (e.g.,AppData/Local/Microsoft/Edge/User Data/Default/Network/Cookies). The script utilizeswin32crypt(Windows DPAPI) to extract master keys and decrypts session cookies using the AES-GCM algorithm. - [DATA_EXFILTRATION]: Decrypted session tokens are cached locally at
~/.codex/cache/buaa_browser_session.jsonand are subsequently transmitted to external BUAA domains (*.buaa.edu.cnand*.msa.buaa.edu.cn) to authenticate API requests. This constitutes a credential harvesting and transmission chain. - [COMMAND_EXECUTION]: The skill employs
subprocess.runto execute various system commands and internal scripts. It invokes theffmpegbinary (viaimageio-ffmpeg) for video stream processing and performs complex chaining of Python scripts (collect_buaa_course_replays.pycallingextract_buaa_classroom.py, which in turn callsextract_ppt_outline.py) to automate the data extraction pipeline.
Recommendations
- AI detected serious security threats
Audit Metadata