wechat-message
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
osascriptto execute AppleScript (scripts/wechat_automation_script.applescript), which leveragesSystem Eventsto perform UI automation. This allows the script to simulate keystrokes, clicks, and window management within the WeChat application. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8). Malicious instructions embedded in data processed by the agent could be used to trigger this skill with attacker-controlled parameters.
- Ingestion points: The
argvarray inwechat_automation_script.applescriptreceives the contact name and message content directly from the agent's environment. - Boundary markers: No delimiters or safety instructions are used to separate the user-provided content from the automation logic.
- Capability inventory: The script can search for any contact, paste content, and send messages, providing a high-impact communication capability.
- Sanitization: There is no validation or sanitization of the
userNameormessageTextbefore they are placed on the system clipboard and pasted into the application. - [DATA_EXPOSURE]: The script explicitly modifies the system clipboard (
set the clipboard to ...). This will overwrite any existing user data in the clipboard and could lead to accidental exposure if the agent or user pastes the content into an unintended location.
Audit Metadata