通达信UA修改,TcefWnd.dll修改

v1.0.0

通达信 TcefWnd.dll User-Agent 修改工具。用于查找通达信安装目录、检测版本信息、修改浏览器组件的 UA 标识。当用户需要修改通达信 UA、伪装成移动端浏览器、或绕过某些网站对通达信内置浏览器的限制时使用此 skill。

0· 67·0 current·0 all-time
by祝先生Bruce@libertyzero10
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, SKILL.md and the included scripts all describe the same capability: locating 通达信 installations and patching TcefWnd.dll to replace the embedded User‑Agent string. The hardcoded installation paths, DLL target, and UA handling are coherent with that stated purpose.
Instruction Scope
SKILL.md instructs scanning specific install paths, previewing, backing up, and restoring — all consistent with binary patching. One minor mismatch: the documentation advises checking that 通达信 processes (tdxcef.exe, TdxW.exe) are not running before patching, but the script does not enforce or perform a process check; it will attempt to copy and overwrite the DLL directly. Also, modifying installed application binaries requires write permissions and carries the expected risk of corrupting the app if done incorrectly.
Install Mechanism
This is an instruction-only skill with a small local Python script and no install spec; nothing is downloaded or written by an installer. That is the lowest-risk install model and matches the skill's function.
Credentials
The skill requests no environment variables or credentials. The only required capabilities are local filesystem read/write access to the target application directories (expected for a patch tool). There are no network endpoints, tokens, or unrelated service credentials requested.
Persistence & Privilege
The skill is not always-enabled and does not modify other skills or global agent config. It does, however, write a .backup file beside the DLL and overwrite the DLL itself — this is necessary for the stated purpose but does require appropriate file system privileges (possibly admin rights) and can be disruptive if performed while the program is running.
Assessment
This tool appears to do what it says: it searches common 通达信 install locations and directly patches TcefWnd.dll to change the embedded User‑Agent. Before using it: (1) confirm you obtained the script from a trusted source (the skill's source is unknown); (2) ensure 通达信 is fully closed (the script does not check running processes) and verify you have permission to overwrite files in the install directory; (3) make a separate copy of the original DLL (the script creates a .backup only if one doesn't already exist); (4) test the restoration procedure in advance; (5) scan the backup and modified file with antivirus/EDS; (6) consider running the script in a sandbox/VM if you are unsure. The skill does not exfiltrate data or require credentials, but patching binaries can break the application — proceed only if you understand those risks.

Like a lobster shell, security has layers — review code before you run it.

latestvk9779c3vxfhe0bkga7qa3ws7a984bcsn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments