wechat

Fail

Audited by Socket on May 9, 2026

2 alerts found:

MalwareSecurity
MalwareHIGH
docs/why-init.md

The provided fragment describes a high-risk key-extraction and protected-data decryption workflow: it uses LLDB to capture the SQLCipher decryption key from a running WeChat process, persists the raw key to `~/.wx-rs/key.hex`, and uses it to decrypt/query encrypted local databases. It also includes privileged host and app security boundary modifications (DevToolsSecurity enablement and re-signing with entitlements) to enable debugger attachment. While the snippet does not directly show network exfiltration code, it strongly indicates capability for unauthorized decryption and privacy-impacting data access, making it a supply-chain security concern if distributed as a dependency/tool.

Confidence: 62%Severity: 82%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the core capabilities broadly match a WeChat automation skill, but the footprint is unusually invasive and broader than the 'local CLI' framing suggests. It installs personal-repo binaries via curl|bash, extracts and stores WeChat DB keys with LLDB, strips Gatekeeper protections, enables autonomous message sending, and offers multiple paths to expose private chat data remotely despite claiming everything runs locally. This looks like a coherent but high-risk research/automation skill, not confirmed malware.

Confidence: 90%Severity: 84%
Audit Metadata
Analyzed At
May 9, 2026, 08:37 AM
Package URL
pkg:socket/skills-sh/leeguooooo%2Fwechat-skill%2Fwechat%2F@f9899e322e1ddb509164b3c988e09495514eecca