{"skill":{"slug":"wechat-file-sender","displayName":"WeChat File Sender","summary":"Send files via Windows WeChat desktop client by automating window control, clipboard, and keyboard input using Node.js and PowerShell scripts.","tags":{"automation":"1.0.1","file":"1.0.1","latest":"1.0.1","rpa":"1.0.1","wechat":"1.0.1","windows":"1.0.1"},"stats":{"comments":0,"downloads":166,"installsAllTime":0,"installsCurrent":0,"stars":0,"versions":2},"createdAt":1774957811243,"updatedAt":1774962107902},"latestVersion":{"version":"1.0.1","createdAt":1774961284854,"changelog":"- Improved documentation in SKILL.md: now includes PowerShell script source, usage security notice, and install instructions.\n- Enhanced security details: filePath must be absolute, contactName is validated, and no network/data exfiltration occurs.\n- Clarified steps, requirements, and implementation notes to make usage and auditing easier.\n- Outlined explicit OpenClaw trigger phrases and command line usage.","license":"MIT-0"},"metadata":null,"owner":{"handle":"26048608982lp-ai","userId":"s173jc10aky6rpg5pveetme0d583pfnm","displayName":"26048608982lp-ai","image":"https://avatars.githubusercontent.com/u/221461112?v=4"},"moderation":{"isSuspicious":true,"isMalwareBlocked":false,"verdict":"suspicious","reasonCodes":["suspicious.dangerous_exec","suspicious.llm_suspicious","suspicious.vt_suspicious"],"summary":"Detected: suspicious.dangerous_exec, suspicious.llm_suspicious, suspicious.vt_suspicious","engineVersion":"v2.2.0","updatedAt":1774962107902}}