wecom-automation
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
child_process.spawninworkflows/handle_message.jsandworkflows/on_event.jsto execute local Python scripts that handle core logic like Q&A, file processing, and notifications. User-controlled strings from message headers and content are passed as arguments to these scripts.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted text, documents (DOCX, PDF), and images from WeChat users and utilizes an LLM to generate responses. - Ingestion points: Incoming messages and files are received in
bot.jsand processed inworkflows/handle_message.jsandworkflows/on_event.js. - Boundary markers: There are no explicit delimiters or instructions to ignore embedded commands within user data passed to LLM-related scripts.
- Capability inventory: The skill can execute local scripts, manage files in the
/tmpdirectory, and communicate with external APIs (LLM providers and Telegram). - Sanitization: No explicit sanitization or filtering of user-provided content is performed before processing.- [EXTERNAL_DOWNLOADS]: The installation script
install.shdownloads thepgvectorsource from GitHub and installs dependencies vianpmandpipfrom official registries. Administrative privileges (sudo) are used during the setup process to install system packages and the pgvector database extension.
Audit Metadata