Csdn Publisher

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

This skill is classified as suspicious due to several high-risk capabilities and a notable vulnerability. The `SKILL.md` instructs the agent to install system-level packages (`yum install`) and configure the browser with `--no-sandbox`, significantly weakening its security posture. Furthermore, `scripts/notion-check-duplicate.sh` is vulnerable to JSON injection, as it directly embeds user-controlled input (`$TITLE`, `$SOURCE_URL`) into a JSON payload for a `curl` request without proper escaping, potentially allowing manipulation of Notion API queries. The use of Chrome DevTools Protocol (`scripts/inject-content.js`) grants deep browser control, and a local proxy (`http://127.0.0.1:20171`) is consistently used across scripts. While the stated purpose (publishing articles) appears benign, these vulnerabilities and capabilities elevate the risk beyond a benign classification.