wechat-daily-report
Fail
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The script
scripts/setup_check.pyclones thewechat-decryptrepository fromhttps://github.com/ylytdeng/wechat-decrypt. This is a non-trusted third-party repository not affiliated with the skill author. - [REMOTE_CODE_EXECUTION]: The skill executes Python scripts within the downloaded
wechat-decryptdirectory (specificallymain.pyanddecrypt_db.py) viasubprocess.run. This represents a 'download then execute' pattern from an unverified source. - [COMMAND_EXECUTION]: In
scripts/decrypt_wechat.py, the skill invokes the system C compiler (cc) to compile a binary from source code (find_all_keys_macos.c) at runtime on macOS platforms. - [PRIVILEGE_ESCALATION]: Documentation in
scripts/decrypt_wechat.pyandscripts/setup_check.pyexplicitly instructs the user to run the tool with administrative (Windows) or root (macOS) privileges. This is required to scan system memory for WeChat's decryption keys, which is a high-risk operation. - [DATA_EXPOSURE]: The skill is designed to access and read sensitive personal data, including local WeChat contact databases and private chat messages. While this is the stated purpose, the combination with untrusted external code execution significantly increases the risk of data compromise.
Recommendations
- AI detected serious security threats
Audit Metadata