qiaomu-opencli-oneshot
Fail
Audited by Gen Agent Trust Hub on May 15, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
TS — Headertemplate inSKILL.mdcontains a hardcoded Bearer token (AAAAAAAAAAAAAAAAAAAAANRILgAAAAAAnNwIzUejRCOuH5E6I8xnZz4puTs%3D...). While this specific string is a known public guest token for Twitter, hardcoding credentials in templates is an unsafe practice. - [CREDENTIALS_UNSAFE]: The skill's core instructions guide the agent to capture and utilize highly sensitive authentication data from the user's active browser session, specifically session cookies, CSRF tokens (
ct0), and custom authorization headers. - [COMMAND_EXECUTION]: The skill instructs the agent to execute shell commands such as
npm run buildandopenclito compile and test code generated during the session. - [REMOTE_CODE_EXECUTION]: The skill implements a dynamic code generation workflow where TypeScript adapters are synthesized based on the structure and responses of external, untrusted websites. This generated code is then executed locally via the
openclienvironment. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its reliance on untrusted external data.
- Ingestion points: Target URLs and their associated API responses captured via
browser_navigateandbrowser_network_requests. - Boundary markers: None; the instructions do not include delimiters or warnings to ignore malicious instructions embedded in the scraped website content.
- Capability inventory: The skill possesses the ability to perform
browser_evaluate, executefetchrequests with user credentials, and run shell commands (npm run build). - Sanitization: There is no evidence of sanitization or validation logic to prevent malicious site content from being interpolated into the generated code templates.
Recommendations
- AI detected serious security threats
Audit Metadata