xiaohongshu-card-notes
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
_postplus_shared/00-core/shared-runtime/scripts/lib/postplus_cli_config.mjsreads and writes sensitive session tokens (cliSessionToken) to local configuration files located in platform-specific directories such as~/.config/postplus/config.jsonorLibrary/Application Support/postplus. - [EXTERNAL_DOWNLOADS]: The script
_postplus_shared/00-core/shared-runtime/scripts/download_videos_from_manifest_with_ytdlp.mjsis designed to download media content from arbitrary remote URLs provided in a manifest file using theyt_dlputility. - [COMMAND_EXECUTION]: Multiple scripts perform shell command execution using the
spawnmodule: download_videos_from_manifest_with_ytdlp.mjsexecutespython3 -m yt_dlpwith arguments derived from an input manifest._postplus_shared/00-core/shared-runtime/scripts/lib/large_credit_confirmation.mjsexecutes thepostplusCLI tool (or a command specified via environment variables likePOSTPLUS_CLI_BIN).- [DATA_EXFILTRATION]: The skill contains a comprehensive network runtime (
_postplus_shared/00-core/shared-runtime/scripts/lib/network_runtime.mjs) and cloud client (_postplus_shared/00-core/shared-runtime/scripts/lib/postplus_cloud_client.mjs) that can send data to external endpoints, including the vendor's API base URL. This capability, combined with access to local session tokens, creates a risk for data exfiltration. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) as it is instructed to process untrusted HTML landing pages, scripts, and source materials. These materials could contain hidden instructions designed to influence the agent's behavior or exploit the available network and command execution tools.
- Ingestion points: User-provided HTML files, spoken scripts, and markdown memos.
- Boundary markers: None identified in the prompt instructions to isolate untrusted content.
- Capability inventory: Subprocess execution (yt_dlp, postplus CLI), network operations (HTTP/HTTPS/Fetch), and file system writes.
- Sanitization: No explicit sanitization of input HTML or script content is performed before processing.
Audit Metadata