Auto Push System Skill
PassAudited by VirusTotal on Mar 31, 2026.
Findings (1)
The skill bundle implements an automated monitoring and data transmission workflow that contains high-risk patterns and vulnerabilities. Specifically, 'scripts/install.sh' uses 'sudo' for directory creation, and the generated 'scripts/check-content.sh' parses log files for file paths which are then read by 'scripts/push-content.sh' without any path validation or sanitization. This creates a significant vulnerability where an attacker could exfiltrate arbitrary local files by injecting malicious entries into the monitored log files. Furthermore, the default configuration in 'scripts/install.sh' includes a hardcoded Feishu chat ID (oc_c133e85bd6eb593e08dcf7aed3a8530b), posing a risk of data exposure if the user does not manually update the settings.
