wecom-automation

Warn

Audited by Snyk on Mar 10, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill directly ingests untrusted, user-generated content from WeChat contacts (text, attachments, images, voice, and URL messages) as shown in bot.js (onMessage/handleUrlMessage) and workflows/handle_message.js (which passes message text/files to answer_question.py, OCR, and transcription) and uses those inputs to generate LLM replies and escalation decisions, so third-party content can materially influence actions and enable indirect prompt injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The install script (install.sh) clones and builds remote code during setup — e.g. git clone --branch v0.5.1 https://github.com/pgvector/pgvector.git followed by make && sudo make install — which fetches and executes external code that the skill relies on for the pgvector extension.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill includes explicit privileged system commands (e.g., "sudo -u postgres createdb wecom_kb"), PM2/service management and filesystem operations that modify the host state and require elevated privileges, so it poses a risk of changing the machine state.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 10, 2026, 04:43 PM