wechat-send
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
osascript(AppleScript) andsubprocessto control the WeChat desktop application and manage system functionalities like screenshots and the clipboard. These operations are implemented safely by passing command arguments as lists and avoiding the use ofshell=True, which effectively prevents shell injection vulnerabilities. - [PROMPT_INJECTION]: The skill accepts user-provided contact names and messages, which represents a potential indirect prompt injection surface.
- Ingestion points:
contactandmessagearguments processed inscripts/wechat_auto.py. - Boundary markers: No explicit delimiters or boundary markers are used to encapsulate user content.
- Capability inventory: Access to system-level UI automation via
osascript, clipboard manipulation viapbcopy, and local screen capturing viascreencapture. - Sanitization: The skill mitigates risks by piping user-provided text directly into
pbcopyvia standard input and using keyboard shortcuts (Command+V) for pasting. This ensures that the message content is treated strictly as data and cannot interfere with the logic of the automation scripts or the underlying system tools.
Audit Metadata