wechat-toolkit
Warn
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts
publish.jsandpublish_with_video.jsuseexecFileSyncto programmatically invokenpmand thewenyanCLI tool. Thepublish.jsscript specifically attempts to runnpm install -gif the tool is missing, which involves global system changes. - [CREDENTIALS_UNSAFE]: The publishing scripts attempt to retrieve
WECHAT_APP_IDandWECHAT_APP_SECRETfromTOOLS.mdfiles located in specific user home directory paths (e.g.,~/.openclaw/workspace-xina-gongzhonghao/TOOLS.md). This involves accessing sensitive configuration data outside the skill's own environment. - [EXTERNAL_DOWNLOADS]: The
download.jsandsearch_wechat.jsscripts fetch and download HTML, images, and video media frommp.weixin.qq.comandweixin.sogou.comto the local filesystem.download.jsuses Puppeteer with security flags disabled (--disable-web-security), which increases risk when rendering untrusted pages. - [PROMPT_INJECTION]: The skill's primary 'washing' feature involves ingesting untrusted articles from the internet. This creates a significant surface for indirect prompt injection, where malicious instructions embedded in an article could manipulate the agent during the rewriting process.
- [DATA_EXFILTRATION]: While intended for functionality, the skill reads local article files and media to upload them to the WeChat Official Account API (
api.weixin.qq.com), representing a trust-dependent data transfer path.
Audit Metadata