create-ex

Fail

Audited by Socket on Apr 10, 2026

2 alerts found:

Malwarex2
MalwareHIGH
prompts/wechat_history.md

This specification describes a high-risk capability: recovering a WeChat SQLCipher key from a running application process (via debugger/memory inspection), decrypting encrypted local databases into plaintext, and exporting sensitive chat histories to portable formats. The workflows require bypassing OS/application protections and using version-specific offsets, indicating intent and technique consistent with privacy-invasive key extraction and decryption tooling rather than a benign import/export utility. No actual code was provided here, so implementation correctness is unknown, but the described behavior strongly elevates security risk in a supply-chain context.

Confidence: 72%Severity: 85%
MalwareHIGH
tools/wechat_decryptor.py

High likelihood this code is intended to steal/decrypt private WeChat message data by extracting encryption keys from a running WeChat process (Windows via pymem; macOS via LLDB attach/read and/or Keychain). It performs sensitive memory inspection, outputs recovered key material, and writes decrypted message databases to disk—capabilities commonly associated with data theft/surveillance rather than normal application functionality. Provided snippet is incomplete, but the malicious intent is strongly indicated by the explicit key-recovery and decryption workflow.

Confidence: 80%Severity: 85%
Audit Metadata
Analyzed At
Apr 10, 2026, 07:51 AM
Package URL
pkg:socket/skills-sh/titanwings%2Fex-skill%2Fcreate-ex%2F@ef39e5614d90ba1bb47eb28de24875011926cd45