douyin-creator
Warn
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/douyin.shis vulnerable to Python code injection. It uses shell variable interpolation inside Python heredocs to pass data to the interpreter. - Evidence: Subcommands such as
idea,hook,script,title,tags,schedule,comment,persona, andreviewuse patterns likeniche = "$NICHE"ordata = "$DATA".split(",")within apython3 << PYEOFblock. - Vulnerability: An attacker providing an argument like
\"; import os; os.system('id'); #would cause the Python interpreter to execute the injected system command instead of treating the input as data. - Inconsistency: Other subcommands within the same script, such as
hashtag,duet, andmonetize, correctly use environment variables (os.environ) to safely pass data to the Python process, indicating the author is aware of safer practices but failed to apply them consistently.
Audit Metadata