wechat-channel
Warn
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted input from external WeChat users and forwards it to the AI Agent gateway without sanitization or boundary delimiters, creating a surface for indirect prompt injection attacks.
- Evidence: In
scripts/wechat-bridge.js, thehandleMessagefunction extracts text from WeChat messages and sends it to theOPENCLAW_GATEWAY_URLvia theforwardToOpenClawfunction. - [DATA_EXFILTRATION]: The bridge service exposes an API endpoint
/api/sendthat accepts a local file path. An attacker who successfully influences the AI Agent (e.g., via indirect prompt injection) can instruct it to exfiltrate sensitive local files to a WeChat account. - Evidence: The
POST /api/sendhandler inscripts/wechat-bridge.jsusesFileBox.fromFile(path)to read arbitrary files from the local filesystem based on thepathparameter provided in the request body. - [COMMAND_EXECUTION]: The skill requires the user to execute shell commands to install dependencies and run a local Node.js server with broad permissions.
- Evidence:
SKILL.mdinstructions includenpm installandnode scripts/wechat-bridge.js. - [EXTERNAL_DOWNLOADS]: The skill downloads several third-party Node.js packages during setup, which introduces supply chain risks.
- Evidence:
package.jsonlists dependencies such aswechaty,wechaty-puppet-padlocal, andaxios.
Audit Metadata