Wps Skill

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

This skill is classified as suspicious due to multiple critical vulnerabilities that could lead to Remote Code Execution (RCE) and arbitrary file system access via prompt injection. Specifically, the `scripts/main.py` script directly passes unsanitized user input to `pyautogui.typewrite` (allowing arbitrary keystroke injection into any active application) and `subprocess.Popen` (creating shell injection vulnerabilities). Additionally, user-controlled file paths are used in `os.path.join` without proper sanitization, leading to path traversal risks. The `SKILL.md` document acknowledges some of these risks but the code does not mitigate them, and sensitive API credentials (`app_id`, `app_secret`) are stored in plain text in `config.json`.