wechat-daily

Fail

Audited by Snyk on Apr 28, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). High-risk dual-use tooling: the code deliberately bypasses app protections (ad-hoc codesign), uses frida to hook CCKeyDerivationPBKDF to capture SQLCipher-derived keys, persists those keys locally, and decrypts WeChat databases/messages—functionality that clearly enables credential theft and unauthorized extraction of private messages (no outbound exfiltration to remote servers is present in the code).

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The scripts call pip at runtime to install and import frida/frida-tools (run_cmd([... "pip", "install", "frida", "frida-tools"]) ), which fetches and executes remote code from PyPI (e.g. https://pypi.org/project/frida) and is required for the runtime key-extraction behavior that injects JS into the WeChat process.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). Yes — the skill explicitly instructs copying and re-signing the WeChat app, installing and using frida to hook CCKeyDerivationPBKDF to extract encrypted DB keys (bypassing app protections), and writing configs/scripts to the host, which are actions that modify system state and circumvent security mechanisms.

Issues (3)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 28, 2026, 11:13 AM
Issues
3