baoyu-post-to-wechat

Warn

Audited by Socket on Apr 24, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/wechat-agent-browser.ts

This code is a legitimate-appearing, purpose-built WeChat editor automation tool, but it performs high-privilege operations: it executes JavaScript in the automated browser context via eval-like commands and includes a sensitive fallback that reads local files using fetch('file://...') and uploads them. No explicit credential theft, persistence, or obvious malicious network behavior is present in this module; however, the eval capability and local-file-to-browser fallback make the supply-chain security risk meaningfully elevated and dependent on the safety of the agent-browser binary and runtime trust model.

Confidence: 62%Severity: 63%
Audit Metadata
Analyzed At
Apr 24, 2026, 11:01 AM
Package URL
pkg:socket/skills-sh/yelban%2Fbaoyu-skills.TW%2Fbaoyu-post-to-wechat%2F@0f6f573618a1b306cb39fd146e49265effe507a7