baoyu-post-to-x

Warn

Audited by Gen Agent Trust Hub on May 12, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses osascript (macOS), powershell.exe (Windows), and xdotool (Linux) to simulate global keyboard events (Cmd+V/Ctrl+V). This provides the agent with the ability to interact with the system's GUI beyond the browser, which is a high-privilege capability.
  • [COMMAND_EXECUTION]: In scripts/paste-from-clipboard.ts, the targetApp variable (from the --app argument) is interpolated directly into an AppleScript string without sanitization. A maliciously crafted application name could lead to arbitrary code execution via AppleScript injection.
  • [COMMAND_EXECUTION]: The skill dynamically generates Swift source code files at runtime (e.g., in scripts/copy-to-clipboard.ts and scripts/check-paste-permissions.ts) and executes them using the swift command-line tool to handle macOS-specific clipboard operations.
  • [EXTERNAL_DOWNLOADS]: The scripts/md-to-html.ts script fetches images from remote HTTPS URLs provided in user-supplied Markdown content. This functionality could be exploited for blind Server-Side Request Forgery (SSRF) or to leak metadata to external servers.
  • [COMMAND_EXECUTION]: The skill uses pkill to forcefully terminate Chrome processes based on command-line pattern matching to resolve automation port conflicts, which could inadvertently affect other running Chrome instances.
Audit Metadata
Risk Level
MEDIUM
Analyzed
May 12, 2026, 03:00 AM