aws-wechat-article-main
Fail
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill manages sensitive secrets including
WRITING_MODEL_API_KEY,IMAGE_MODEL_API_KEY, and WeChatAPPID/APPSECRETwithin a file namedaws.env. The scriptscripts/validate_env.pyreads the contents of this file to perform presence checks.\n- [DATA_EXFILTRATION]: The scriptscripts/validate_env.pyaccesses and reads sensitive environment files (aws.env). Reading sensitive file paths is a high-risk pattern for data exposure, as the contents are accessible to the agent and could be potentially exfiltrated despite instructions to the contrary.\n- [COMMAND_EXECUTION]: The skill invokes the local Python interpreter to runscripts/validate_env.pyfor mandatory environment verification.\n- [PROMPT_INJECTION]: The skill employs strong override markers and restrictive language (e.g., "⛔ BLOCKING", "禁止") to enforce a rigid workflow sequence. It also presents an indirect prompt injection risk surface: external user data from topics and article drafts is ingested at runtime and interpolated into subsequent prompts without sanitization or clear boundary markers (such as delimiters), while the skill retains access to subprocess and file-write capabilities.
Recommendations
- AI detected serious security threats
Audit Metadata