wecom-automation
Warn
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
install.shscript executes multiple commands withsudoprivileges to perform system-level tasks such as installing packages, managing the PostgreSQL database, and installing the compiledpgvectorextension. - [COMMAND_EXECUTION]: The
workflows/handle_message.jsandworkflows/on_event.jsscripts utilizechild_process.spawnto run Python utilities, passing user-supplied input (such as message text and sender names) directly as command-line arguments to the scripts. - [EXTERNAL_DOWNLOADS]: The installation script fetches system dependencies using
aptand clones thepgvectorextension from its official GitHub repository. - [REMOTE_CODE_EXECUTION]: During the setup process, the skill clones, builds, and installs the
pgvectorlibrary from a remote GitHub repository usingmakeandsudo make installat runtime. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface. Untrusted data enters the system through the
onMessageevent inbot.js. The skill lacks explicit sanitization or boundary markers before processing this data through an LLM and local scripts (runPythonScriptinhandle_message.js), which have capabilities such as file system and database access.
Audit Metadata