wechat-rpa-bot

Warn

Audited by Socket on May 5, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
references/install.md

No concrete malicious code is shown (it is an installation guide), but it describes security-sensitive behavior: downloading and trusting an unverifiable native executable (service.exe) without integrity verification guidance, and activating it via a remote license flow that likely transmits device machine identifiers to www.yokoagi.com. This creates meaningful supply-chain and privacy/authorization risk that should be addressed by artifact verification (hash/signature), endpoint/data minimization review, and auditing of the referenced startup/SOP steps (especially batch-script generation and service execution).

Confidence: 56%Severity: 66%
AnomalyLOW
references/openapi.json

No executable malicious code is present in the provided fragment because it is only an OpenAPI specification. However, the API contract defines a powerful and highly abusable automation/data-access surface: it can send/upload content using client-supplied absolute file paths (potential local file disclosure risk), fetch real-time chat messages (privacy exposure), trigger mass/scheduled outreach and AI automation toggles (impact amplification if misused), and includes an explicitly documented dangerous auto-configuration endpoint that can kill WeChat and inject environment variables/debug ports (strong runtime tampering/debug exposure red flag). Overall, this should be treated as a security alert pending implementation review of access control, path validation, and safeguards; malware intent cannot be confirmed from this fragment alone.

Confidence: 60%Severity: 68%
Audit Metadata
Analyzed At
May 5, 2026, 05:42 AM
Package URL
pkg:socket/skills-sh/leomusk%2Fwechat-rpa-bot-skill%2Fwechat-rpa-bot%2F@73aa260bf46bbcf80df9d650644b1f8f543ab175