Dangerous exec
- Finding
- Shell command execution detected (child_process).
Security checks across static analysis, malware telemetry, and agentic risk
This skill appears designed to post to WeChat as advertised, but review it first because it can use official-account credentials or browser sessions, automatically trust project config, and drive your browser/clipboard.
Install only if you trust this publisher and need automated WeChat Official Account posting. Before running it, inspect any project/user EXTEND.md, keep AppSecrets out of shared repositories, confirm the target WeChat account and Chrome profile, and expect the skill to control Chrome, clipboard, and local commands during browser workflows.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If the wrong credential or Chrome profile is used, content could be created under the wrong WeChat Official Account or sensitive account secrets could be exposed through local config handling.
WeChat AppSecret values and logged-in Chrome profiles can authorize actions as an Official Account, which is high-impact account authority.
EXTEND.md supports managing multiple WeChat Official Accounts... each account can have its own credentials, Chrome profile... `app_id`, `app_secret`, `chrome_profile_path`
Store WeChat secrets outside project files where possible, avoid committing EXTEND.md with secrets, use a dedicated Chrome profile, and verify the selected account before posting.
A stale or untrusted project config could silently change the publishing method, account, author, comment settings, or profile used by the skill.
Project or user EXTEND.md files are persistent context that can control account settings and may be applied automatically, including single-account auto-selection.
Found | Read, parse, apply settings ... `accounts` with 1 entry | Auto-select, no prompt
Review `.baoyu-skills/baoyu-post-to-wechat/EXTEND.md` before use, especially in projects from others, and require an explicit account confirmation for publishing.
If focus is wrong, clipboard contents could be pasted into another application, and the automation may interact with WeChat in ways users should explicitly approve.
The script can send real OS-level paste keystrokes to the active app and explicitly describes bypassing website detection of synthetic events.
Send real paste keystroke (Cmd+V / Ctrl+V) to the frontmost application ... This bypasses CDP's synthetic events which websites can detect and ignore.
Use browser mode only when Chrome is clearly focused and the target page/account is visible; prefer safer API/draft workflows when possible.
The first run may depend on the npm/npx supply chain rather than only local bundled files.
If Bun is not already installed, the documented fallback may fetch and run Bun via npx at runtime.
Resolve `${BUN_X}` runtime: if `bun` installed → `bun`; if `npx` available → `npx -y bun`Install Bun from a trusted source in advance or review the runtime download path before using the skill.