create-ex
Audited by Socket on Apr 10, 2026
2 alerts found:
Malwarex2This specification describes a high-risk capability: recovering a WeChat SQLCipher key from a running application process (via debugger/memory inspection), decrypting encrypted local databases into plaintext, and exporting sensitive chat histories to portable formats. The workflows require bypassing OS/application protections and using version-specific offsets, indicating intent and technique consistent with privacy-invasive key extraction and decryption tooling rather than a benign import/export utility. No actual code was provided here, so implementation correctness is unknown, but the described behavior strongly elevates security risk in a supply-chain context.
High likelihood this code is intended to steal/decrypt private WeChat message data by extracting encryption keys from a running WeChat process (Windows via pymem; macOS via LLDB attach/read and/or Keychain). It performs sensitive memory inspection, outputs recovered key material, and writes decrypted message databases to disk—capabilities commonly associated with data theft/surveillance rather than normal application functionality. Provided snippet is incomplete, but the malicious intent is strongly indicated by the explicit key-recovery and decryption workflow.