wechat-rpa-bot
Audited by Socket on May 5, 2026
2 alerts found:
Anomalyx2No concrete malicious code is shown (it is an installation guide), but it describes security-sensitive behavior: downloading and trusting an unverifiable native executable (service.exe) without integrity verification guidance, and activating it via a remote license flow that likely transmits device machine identifiers to www.yokoagi.com. This creates meaningful supply-chain and privacy/authorization risk that should be addressed by artifact verification (hash/signature), endpoint/data minimization review, and auditing of the referenced startup/SOP steps (especially batch-script generation and service execution).
No executable malicious code is present in the provided fragment because it is only an OpenAPI specification. However, the API contract defines a powerful and highly abusable automation/data-access surface: it can send/upload content using client-supplied absolute file paths (potential local file disclosure risk), fetch real-time chat messages (privacy exposure), trigger mass/scheduled outreach and AI automation toggles (impact amplification if misused), and includes an explicitly documented dangerous auto-configuration endpoint that can kill WeChat and inject environment variables/debug ports (strong runtime tampering/debug exposure red flag). Overall, this should be treated as a security alert pending implementation review of access control, path validation, and safeguards; malware intent cannot be confirmed from this fragment alone.