juejin-auto-checkin

Fail

Audited by Gen Agent Trust Hub on Apr 23, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The scripts/cron_manager.py script uses os.system() to execute shell commands. It incorporates a script path provided via command-line arguments directly into the shell command string, which creates a significant risk of command injection.
  • [COMMAND_EXECUTION]: The skill establishes persistence by creating a macOS LaunchAgent (~/Library/LaunchAgents/com.juejin.autosignin.plist). This mechanism ensures the daily execution of automation scripts in the background, which is a common persistence technique used to maintain access or run tasks without user interaction.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 23, 2026, 12:33 AM