md-to-wechat
Warn
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
scripts/publish.pyscript prompts users for sensitive WeChat API credentials and stores them in a local plain-text JSON file. - Evidence: The script defines
CONFIG_FILE = SCRIPT_DIR / ".wechat_config.json"and uses thesave_configfunction to writeappidandappsecretdirectly to this file. - [CREDENTIALS_UNSAFE]: The script caches the WeChat
access_tokenin a local file, which could be accessed by other malicious scripts or agents in the same environment. - Evidence:
TOKEN_CACHE_FILE = SCRIPT_DIR / ".wechat_token.json"is used to store temporary authentication tokens. - [EXTERNAL_DOWNLOADS]: The skill performs network operations to interact with WeChat's official services. These are well-known services and the actions are documented neutrally.
- Evidence: The script fetches tokens and uploads content to
api.weixin.qq.comusing therequestslibrary. - [COMMAND_EXECUTION]: The skill relies on executing local Python scripts that perform file system reads/writes and network communication.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection via the Markdown files it processes.
- Ingestion points: Reads user-provided Markdown files in
convert.pyandpublish.pyusingread_text(). - Boundary markers: Absent; there are no specific markers used to distinguish between content and instructions within the processed files.
- Capability inventory: The skill can write files to the local disk and perform network POST requests to the WeChat API.
- Sanitization: While it uses
BeautifulSoupand standardmarkdownlibraries for structural conversion, it does not explicitly sanitize the input for platform-specific injection payloads.
Audit Metadata