instagram-publisher
Warn
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
SKILL.mdinvocation string and workflow instructions facilitate command injection by interpolating user-controlled variables ({images}and{caption}) directly into a shell command line. An attacker could craft inputs containing shell metacharacters (e.g.,;,&,|, or backticks) to execute arbitrary code on the host system. - [DATA_EXFILTRATION]: The
scripts/publish.jsscript reads local files from the filesystem usingreadFileSyncand transmits them tohttps://catbox.moe/user/api.php. Catbox.moe is a third-party, anonymous file hosting service. This mechanism allows the transmission of local data to an external service where the content becomes publicly accessible. If an attacker can influence the file paths provided to the script, they could exfiltrate sensitive system files (e.g., SSH keys or credentials). - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection as it processes untrusted data which is subsequently used in high-capability operations (network requests and command execution).
- Ingestion points: Data provided via the
--imagesand--captioncommand-line arguments. - Boundary markers: None. Content is interpolated directly into the execution context.
- Capability inventory: File system read access (
readFileSync) and network communication (fetch). - Sanitization: None. The script performs basic length and count validation but does not sanitize content against injection or path traversal.
Audit Metadata