juejin-auto-checkin
Fail
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/cron_manager.pyscript usesos.system()to execute shell commands. It incorporates a script path provided via command-line arguments directly into the shell command string, which creates a significant risk of command injection. - [COMMAND_EXECUTION]: The skill establishes persistence by creating a macOS LaunchAgent (
~/Library/LaunchAgents/com.juejin.autosignin.plist). This mechanism ensures the daily execution of automation scripts in the background, which is a common persistence technique used to maintain access or run tasks without user interaction.
Recommendations
- AI detected serious security threats
Audit Metadata