wecom-automation
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The
install.shscript performs system-level operations usingsudo, including the installation of system dependencies viaapt, database creation, and the compilation of thepgvectorextension from source code. - [COMMAND_EXECUTION]: The message handling logic in
workflows/handle_message.jsandworkflows/on_event.jsuseschild_process.spawnto dynamically execute local Python scripts. User-provided text from WeChat messages is passed directly as command-line arguments to these scripts. - [EXTERNAL_DOWNLOADS]: The installation script fetches the
pgvectorsource code from its official repository on GitHub and installs numerous packages from the NPM and PyPI registries. These are standard operations for setting up the skill's required environment. - [PROMPT_INJECTION]: The skill acts as an interface between untrusted WeChat users and an LLM, making it a surface for indirect prompt injection.
- Ingestion points: Incoming messages, file attachments (DOCX, PDF), and images (OCR) are processed in
bot.jsand passed to the logic layer. - Boundary markers: No specific delimiters or safety instructions were observed in the JavaScript wrappers to prevent the LLM from following instructions embedded in user messages.
- Capability inventory: The skill possesses the ability to execute local scripts, read/write to the local filesystem (in
/tmp), and communicate with external APIs (LLM providers and Telegram). - Sanitization: There is no evidence of explicit sanitization or filtering of the content received from WeChat before it is sent to the LLM scripts.
- [CREDENTIALS_UNSAFE]: The skill's configuration pattern relies on a
.envfile to store sensitive information such as theWECHATY_TOKEN,LLM_API_KEY, andTELEGRAM_BOT_TOKEN. These credentials are used as environment variables or passed as CLI arguments, which can potentially expose them in system process listings.
Audit Metadata