wechat-theme-extractor
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python script
scripts/extract.pywhich uses thesubprocessmodule to invokecurl. This is used to fetch the content of the WeChat article provided by the user. The command is implemented securely by passing arguments as a list to avoid shell injection. - [EXTERNAL_DOWNLOADS]: The skill fetches HTML content from
mp.weixin.qq.com. This is a well-known service, and the operation is required for the skill to perform its intended theme extraction functionality. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection (Category 8) because it ingests and analyzes untrusted data from external URLs.
- Ingestion points: External HTML content is fetched via
scripts/extract.pyand saved to.extracted_content.htmlfor the AI to analyze. - Boundary markers: There are no explicit boundary markers or instructions to ignore embedded commands when the AI processes the extracted HTML file.
- Capability inventory: The skill has the capability to write to local files (
markdown-to-wechat.html) and trigger browser previews, which could be targeted by instructions hidden in a malicious article. - Sanitization: The script extracts content using regex but does not perform sanitization or filtering of the HTML to remove potential prompt injection payloads.
Audit Metadata