wx-cli-wechat-local-data
Fail
Audited by Gen Agent Trust Hub on May 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation instructions include patterns that download and execute scripts directly from a remote source via the command line, which could allow for arbitrary code execution.
- Evidence:
curl -fsSL https://raw.githubusercontent.com/jackwener/wx-cli/main/install.sh | bashinSKILL.md. - Evidence:
irm https://raw.githubusercontent.com/jackwener/wx-cli/main/install.ps1 | iexinSKILL.md. - [COMMAND_EXECUTION]: The skill instructs the user or agent to perform high-risk system operations that require elevated privileges and bypass standard security controls.
- Evidence: Commands requiring
sudoor Administrator access, such assudo wx init. - Evidence: Instructions to modify application code signatures using
codesignto allow memory scanning. - Evidence: Instructions to reset macOS TCC (Transparency, Consent, and Control) privacy database entries using
tccutilfor multiple sensors and folders. - [DATA_EXFILTRATION]: The core functionality involves extracting highly sensitive personal information, including chat history, contact lists, and encryption keys, from a local application's memory and database.
- Evidence: "Scans WeChat's memory to extract database encryption keys" in
SKILL.md. - Evidence: Capability to query and export messages, contacts, groups, and favorites.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/jackwener/wx-cli/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata