wechat-watch
Fail
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
README.mdwithin thewechat-download-apiservice contains instructions to download a binary for thegostproxy tool fromgh-proxy.comandghproxy.cc. These mirrors are flagged by automated scanners as malicious/phishing sites. - [REMOTE_CODE_EXECUTION]:
SKILL.mdand the service documentation instruct the agent to clone an external repository (github.com/tmwgsicp/wechat-download-api) and execute its startup scripts (bash start.shordocker-compose up -d). This involves fetching and running code from a third-party source not associated with the skill author. - [COMMAND_EXECUTION]: The provided
start.shscript, when run with sudo, registers a systemd service (wechat-article-api.service). This modifies the system configuration and establishes persistence for the external code. - [CREDENTIALS_UNSAFE]: The application is designed to collect and store sensitive WeChat session cookies and tokens in a local
.envfile. These credentials are stored in plain text and represent a significant security risk if the environment is compromised.
Recommendations
- AI detected serious security threats
- Contains 3 malicious URL(s) - DO NOT USE
Audit Metadata