baoyu-post-to-weibo

Warn

Audited by Gen Agent Trust Hub on Apr 24, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses spawnSync and process.kill to automate high-privilege UI interactions and manage Chrome processes.
  • scripts/paste-from-clipboard.ts executes osascript (macOS), powershell.exe (Windows), and xdotool/ydotool (Linux) to simulate real user paste events to bypass anti-bot detection.
  • scripts/copy-to-clipboard.ts dynamically generates a Swift script, writes it to a temporary file, and executes it via the swift compiler on macOS.
  • scripts/weibo-utils.ts and scripts/weibo-article.ts use pkill and process.kill to terminate Chrome instances based on profile paths.
  • [REMOTE_CODE_EXECUTION]: The skill dynamically imports JavaScript modules from an external CDN at runtime.
  • scripts/vendor/baoyu-md/src/utils/languages.ts uses import() to load syntax highlighting language packages from https://cdn-doocs.oss-cn-shenzhen.aliyuncs.com/npm/highlightjs/.
  • [EXTERNAL_DOWNLOADS]: The skill fetches resources from external URLs during processing.
  • scripts/vendor/baoyu-md/src/images.ts contains a downloadFile function that fetches images from arbitrary URLs provided in Markdown content.
  • scripts/vendor/baoyu-md/src/extensions/plantuml.ts communicates with https://www.plantuml.com/plantuml for remote diagram rendering.
  • [DYNAMIC_EXECUTION]: The skill uses Chrome DevTools Protocol (CDP) to execute arbitrary JavaScript in the browser context via Runtime.evaluate.
  • scripts/weibo-article.ts and scripts/weibo-post.ts inject and run complex JavaScript strings to interact with the Weibo web interface, including setting values and triggering events.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 24, 2026, 10:59 AM