x-tweet-fetcher
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script sogou_wechat.py generates Python code as a string and executes it on a remote host via ssh and scp, facilitating arbitrary remote code execution on external infrastructure.
- [REMOTE_CODE_EXECUTION]: sogou_wechat.py and fetch_china.py implement a router-agent mechanism that writes shell commands to /root/router-agent/cmd-queue, enabling command execution by a background process likely possessing elevated privileges.
- [COMMAND_EXECUTION]: The skill uses subprocess.run to invoke system binaries including ssh, scp, and bash to facilitate remote operations and file system manipulations related to command queues.
- [DATA_EXFILTRATION]: The integration with remote SSH hosts and local system-level command queues creates potential side-channels for exfiltrating fetched social media content or sensitive system data to external infrastructure controlled by an attacker.
- [EXTERNAL_DOWNLOADS]: The skill performs numerous data-fetching operations from third-party services like Sogou WeChat search, Nitter, and FxTwitter, which involves the processing and ingestion of untrusted external content.
Recommendations
- HIGH: Downloads and executes remote code from: https://weixin.sogou.com/weixin?type=2&query={{quote({repr(keyword)})}}, unknown (check file) - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata