Is postiz safe?

https://clawhub.ai/nevo-david/postiz

82
SAFE

Postiz is a legitimate social media automation CLI skill with clean installation behavior, no canary file access, and no network activity during clone. The primary risks are medium-severity: unsafe shell command construction patterns in JavaScript examples that could lead to command injection if agents replicate them with untrusted input, and the inherent capability to upload files and post content to external services. No prompt injection, hidden instructions, or malicious behavior detected.

Category Scores

Prompt Injection 78/100 · 30%
Data Exfiltration 90/100 · 25%
Code Execution 72/100 · 20%
Clone Behavior 100/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 75/100 · 5%

Findings (7)

MEDIUM Unsafe shell command construction in examples -15

Multiple JavaScript and shell examples demonstrate constructing shell commands by directly interpolating variables into command strings passed to execSync(). For example, Pattern 5 builds: postiz posts:create -c "${content}" ... --settings '${JSON.stringify(settings)}' -i "${integrationId}". If an agent copies this pattern with user-supplied content, shell metacharacters in the content could lead to command injection.

MEDIUM Broad Bash tool access pattern -10

The skill declares allowed-tools as Bash(postiz:*), which grants the agent permission to execute any shell command matching the postiz prefix. While this is appropriately scoped for the CLI's functionality, it still grants shell execution capability that could be misused if the tool permission matching is loosely implemented.

LOW External URL reference in metadata -2

The skill's homepage field points to https://docs.postiz.com/public-api/introduction. While the skill does not instruct the agent to fetch this URL, an overly helpful agent might visit it, potentially exposing the agent to content at that URL.

LOW File upload capability to external CDN -5

The postiz upload command sends local files to the Postiz CDN (cdn.postiz.com). While this is intended functionality, it creates a data exfiltration channel if an agent is socially engineered into uploading sensitive files.

LOW Potential data leak via social media posts -5

An agent using this skill could inadvertently post sensitive information to public social media platforms. The skill creates posts across 28+ platforms simultaneously, amplifying the impact of any accidental data exposure.

INFO Extensive documentation with many code examples -5

The skill contains over 1000 lines of documentation across multiple files with numerous executable code examples. While thorough, the volume of content increases the surface area for an agent to follow potentially unsafe patterns.

INFO Empty package.json 0

The package.json file appears to be empty, meaning there are no npm dependencies or install scripts. This is actually a positive finding — no supply chain risk from dependencies.