baoyu-post-to-wechat
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
scripts/md/utils/languages.tsdynamically fetches and executes JavaScript modules for code syntax highlighting from an external CDN (cdn-doocs.oss-cn-shenzhen.aliyuncs.com) using theimport()function. - [COMMAND_EXECUTION]: Extensive use of shell command execution across multiple scripts to control the environment and system tools.
scripts/copy-to-clipboard.tsdynamically generates a Swift script on macOS and executes it using theswiftcommand. It also executespowershell.exeon Windows andxclip/wl-copyon Linux.scripts/paste-from-clipboard.tsusesosascript(macOS),powershell.exe(Windows), andxdotool/ydotool(Linux) to simulate system-wide keystrokes.scripts/cdp.tsandscripts/wechat-browser.tslaunch Chrome with various flags including--disable-blink-features=AutomationControlledto bypass bot detection.- [EXTERNAL_DOWNLOADS]:
scripts/md-to-wechat.tsfetches images from arbitrary remote URLs provided in markdown content usinghttp/httpsand saves them to a temporary directory on the local disk. - [CREDENTIALS_UNSAFE]: The skill instructs the agent to prompt the user for WeChat API credentials (
WECHAT_APP_ID,WECHAT_APP_SECRET) and store them in.envfiles located in the project directory or the user's home directory.
Audit Metadata