龙虾内容工厂

PassAudited by VirusTotal on Mar 28, 2026.

Findings (1)

The skill bundle automates content creation and posting to Xiaohongshu (XHS) using Playwright and FFmpeg, but contains several high-risk flaws and vulnerabilities. Specifically, `publish-xhs.js` uses a hardcoded absolute path to a specific user's home directory (`/Users/houdaliang/`) to load Playwright and employs `innerHTML` injection to set post content without sanitization, which could lead to self-XSS. Furthermore, `generate-today.py` references a hardcoded path for a different skill name (`xhs-smart-post`), indicating poor packaging or unintentional bugs. While the browser automation via CDP (port 18800) is aligned with the stated purpose, these implementation flaws and the control of a logged-in session represent significant security risks.