x-tweet-fetcher

Fail

Audited by Gen Agent Trust Hub on Mar 17, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The script sogou_wechat.py generates Python code as a string and executes it on a remote host via ssh and scp, facilitating arbitrary remote code execution on external infrastructure.
  • [REMOTE_CODE_EXECUTION]: sogou_wechat.py and fetch_china.py implement a router-agent mechanism that writes shell commands to /root/router-agent/cmd-queue, enabling command execution by a background process likely possessing elevated privileges.
  • [COMMAND_EXECUTION]: The skill uses subprocess.run to invoke system binaries including ssh, scp, and bash to facilitate remote operations and file system manipulations related to command queues.
  • [DATA_EXFILTRATION]: The integration with remote SSH hosts and local system-level command queues creates potential side-channels for exfiltrating fetched social media content or sensitive system data to external infrastructure controlled by an attacker.
  • [EXTERNAL_DOWNLOADS]: The skill performs numerous data-fetching operations from third-party services like Sogou WeChat search, Nitter, and FxTwitter, which involves the processing and ingestion of untrusted external content.
Recommendations
  • HIGH: Downloads and executes remote code from: https://weixin.sogou.com/weixin?type=2&query={{quote({repr(keyword)})}}, unknown (check file) - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 17, 2026, 01:18 AM