tiktok-warmup
Fail
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill uses the 1Password CLI (
op) to retrieve cleartext passwords and usernames for TikTok and email accounts. Instructions inloginRef.mdandregenerate-mlx-token.pyuse the--revealflag to fetch sensitive secrets into the execution environment, where they are then used in shell commands and browser automation. - [EXTERNAL_DOWNLOADS]: The skill performs remote code execution and software installation during its setup and operation.
SKILL.mdtriggers an update vianpx skills updatefrom 'fstack', andpeekabooRef.mdinstalls the 'peekaboo' utility via Homebrew. - [REMOTE_CODE_EXECUTION]: The 'Nightly Audit' protocol defined in
nightlyAuditRef.mdcreates a self-modifying code loop. An automated agent analyzes log data from TikTok and Airtable and performs git-based modifications to the skill's own scripts (tiktok-warmup-poc.py) and instructions (runtimeLearnings.md,auditLogs.md). This creates a significant attack surface where untrusted data from the web can influence code changes. - [COMMAND_EXECUTION]: The skill makes extensive use of Python's
subprocessandos.systemequivalents to execute a wide range of external CLI tools, includinggit,op,curl,ffmpeg, andpeekaboo. This reliance on external binaries increases the potential for command injection if inputs are not properly sanitized. - [DATA_EXFILTRATION]: The skill captures and transmits sensitive data to multiple third-party services. Screenshots of browser and mobile cloud phone sessions are taken during operation and sent to Telegram (
executeWarmupsServerRef.md). Operational logs and engagement metadata are also transmitted to Supabase and Airtable.
Recommendations
- HIGH: Downloads and executes remote code from: unknown (check file) - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata