baoyu-post-to-wechat
Warn
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
scripts/vendor/baoyu-md/src/utils/languages.tsperforms dynamicimport()of JavaScript modules from an external CDN (cdn-doocs.oss-cn-shenzhen.aliyuncs.com) based on the language of code blocks in processed markdown. - [COMMAND_EXECUTION]: The scripts
scripts/copy-to-clipboard.tsandscripts/paste-from-clipboard.tsgenerate temporary Swift and AppleScript source files at runtime and execute them to facilitate cross-platform clipboard interactions. - [COMMAND_EXECUTION]: Browser automation logic in
scripts/wechat-article.tsandscripts/wechat-browser.tsutilizes the Chrome DevTools Protocol (CDP)Runtime.evaluatecommand to execute arbitrary JavaScript strings within the browser context. - [EXTERNAL_DOWNLOADS]: The skill automatically downloads image files from arbitrary remote URLs found within user-supplied markdown files during the conversion process in
scripts/vendor/baoyu-md/src/images.ts. - [COMMAND_EXECUTION]: The skill uses
spawnSyncto execute various system commands includingosascript,swift,powershell, andnpxto perform environment checks and operational tasks.
Audit Metadata