baoyu-post-to-x
Warn
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
osascript(macOS),powershell.exe(Windows), andxdotool(Linux) to simulate global keyboard events (Cmd+V/Ctrl+V). This provides the agent with the ability to interact with the system's GUI beyond the browser, which is a high-privilege capability. - [COMMAND_EXECUTION]: In
scripts/paste-from-clipboard.ts, thetargetAppvariable (from the--appargument) is interpolated directly into an AppleScript string without sanitization. A maliciously crafted application name could lead to arbitrary code execution via AppleScript injection. - [COMMAND_EXECUTION]: The skill dynamically generates Swift source code files at runtime (e.g., in
scripts/copy-to-clipboard.tsandscripts/check-paste-permissions.ts) and executes them using theswiftcommand-line tool to handle macOS-specific clipboard operations. - [EXTERNAL_DOWNLOADS]: The
scripts/md-to-html.tsscript fetches images from remote HTTPS URLs provided in user-supplied Markdown content. This functionality could be exploited for blind Server-Side Request Forgery (SSRF) or to leak metadata to external servers. - [COMMAND_EXECUTION]: The skill uses
pkillto forcefully terminate Chrome processes based on command-line pattern matching to resolve automation port conflicts, which could inadvertently affect other running Chrome instances.
Audit Metadata