WeCom文件检测

ReviewAudited by ClawScan on May 1, 2026.

Overview

This is a coherent file-retrieval helper for WeCom attachments, but it may inspect and copy recent chat files, so users should be aware of what files are being accessed.

Before installing, understand that this skill is designed to inspect files under ~/.openclaw/media/inbound/ and may copy important ones into companywork/. It appears purpose-aligned and does not include code, installation steps, credentials, or external data transfer, but you should name the file you want when possible and avoid archiving sensitive attachments unless needed.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may look through recent files in the WeCom inbound attachment folder to find a likely match.

Why it was flagged

The skill instructs the agent to use local shell commands to enumerate recent inbound files. This is aligned with the file-retrieval purpose, but it means the agent may inspect local attachment listings when invoked.

Skill content
ls -lt ~/.openclaw/media/inbound/ | head -20
Recommendation

Use this skill when you intend the agent to access inbound chat attachments, and specify the filename or confirm the selected file when possible.

What this means

Sensitive documents received through chat could be copied into a longer-lived workspace directory and reused later.

Why it was flagged

The skill recommends copying important files into a persistent companywork directory. This is disclosed and related to the purpose, but it can retain sensitive attachments beyond the original chat-transfer location.

Skill content
重要文件应存档到 companywork/ 相关目录
Recommendation

Confirm before archiving sensitive files, use an appropriate project directory, and remove retained copies when they are no longer needed.