wechat-publisher-yashu

Fail

Audited by Gen Agent Trust Hub on Feb 27, 2026

Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [OBFUSCATION]: The core logic in index.js is heavily obfuscated using a string-array and character-mapping technique. This is explicitly acknowledged in the SKILL.md file, which forbids the agent from reading the file. Obfuscation is a high-risk indicator as it hides the script's actual behavior from users and automated tools.
  • [COMMAND_EXECUTION]: The script uses child_process.execSync to run wmic commands on Windows. Specifically, it executes wmic cpu get ProcessorId, wmic baseboard get SerialNumber, and wmic csproduct get UUID. These commands are used to fingerprint the user's hardware for a licensing system.
  • [DATA_EXFILTRATION]: The skill requires users to provide their WeChat APP_ID and APP_SECRET. While the visible URLs in the obfuscated code point to official WeChat endpoints (api.weixin.qq.com), the obfuscation makes it impossible to verify if these credentials or the gathered hardware identifiers are also sent to the author's servers or other third parties.
  • [EXTERNAL_DOWNLOADS]: The documentation references external sites for theme previews (5g6pxtj3zg.coze.site) and a commercial shop (shop.wangchengq.com) for purchasing license keys. These are non-standard dependencies for a utility skill.
  • [PROMPT_INJECTION]: SKILL.md contains instructions that attempt to control the analyzer or agent behavior by explicitly forbidding the reading of index.js ("Absolutely forbidden to read the wechat-publisher-yashu/index.js file").
  • [PERSISTENCE]: The code creates and reads files in sensitive locations like AppData/Roaming and local temporary files (.cache_d7f3a2.tmp) to maintain its licensing state across sessions.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 27, 2026, 08:51 PM