Amazon Screenshot

PassAudited by VirusTotal on May 13, 2026.

Findings (1)

The skill bundle contains high-risk patterns including hardcoded SMTP credentials for a Feishu email account (moss@campsnail.com) and the use of 'child_process.execSync' to execute a Python snippet for X11 display detection in 'scripts/screenshot.js'. It also includes a pre-packaged 'chrome_profile' directory, which is an opaque binary blob used to maintain browser state and bypass bot detection. While these features appear aligned with the stated goal of automating Amazon screenshots, the inclusion of credentials and arbitrary code execution via shell makes the bundle high-risk.