Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

wechat-reply-ai

v1.0.0

Windows 本地微信自动回复与消息处理工具。用于 Codex 需要在已登录的 PC 微信上执行联系人定位、OCR 读取最新消息、生成并发送中文回复、发送图片/视频/文件、截图最新图片预览、或启动常驻守护进程加速代回时。适用于“回 xxx”“查看微信最新消息”“帮我发图片/视频”“把微信代回流程固化成快路径”等场景。

0· 78·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the included scripts: the code automates PC WeChat via UI automation, OCR, clipboard, screenshots, and can send messages and media. However there are surprising implementation choices (a hidden background daemon, hard-coded output path like D:\Backup\Documents\Playground\wechat_screen.png) that are not explicitly called out in the description and may be unexpected to users.
Instruction Scope
SKILL.md instructs the agent to run the provided scripts (read/send/daemon). The runtime instructions and code will capture screenshots, read and set clipboard contents, search windows, launch the WeChat EXE, and write logs/state files. Those actions are within the stated purpose but are sensitive (screen/clipboard/file I/O and launching processes) and should be understood before use.
Install Mechanism
There is no install spec (instruction-only with bundled scripts), so nothing is downloaded or extracted by the registry installer. Dependencies are declared in references but not installed automatically; risk is limited to running the included Python scripts and any third-party packages they import.
Credentials
The skill does not request environment variables or external credentials, which is appropriate. However the code legitimately accesses local sensitive resources (clipboard, screenshots, filesystem, ability to launch processes). Those accesses are proportional to GUI automation tasks but still sensitive and should be expected.
!
Persistence & Privilege
The daemon can be started as a hidden background process (powershell Start-Process with -WindowStyle Hidden), writes a state file containing host/port/token, and serves an RPC endpoint on 127.0.0.1. This creates a long-lived local service and a local token that other local processes could potentially read. While not labeled 'always', this persistent hidden daemon increases attack surface and merits caution.
What to consider before installing
This skill appears to do what it says (local Windows WeChat automation) but carries several practical risks you should consider before installing or running it from an unknown source: - Sensitive local access: it captures screenshots, reads and writes the clipboard, launches the WeChat executable, and writes log/state/image files to disk. These are necessary for GUI automation but can expose local data. - Persistent hidden daemon: you can start a background process (hidden) that listens on localhost and writes a state file with a token; this increases the persistent footprint and local attack surface. Inspect the state file location and contents before trusting it. - Hard-coded file paths: the code writes screenshots to an absolute path (e.g., D:\Backup\Documents\Playground\wechat_screen.png) — this is surprising and may overwrite files or fail on systems without that path. - Unknown provenance: no homepage/source repository is provided. Prefer code from a vetted author or run inside a disposable VM or sandbox. - Dependencies: the scripts require native Windows packages (uiautomation, pywinauto, pywin32, Pillow, rapidocr-onnxruntime). Some packages may download models or binaries; install these deliberately and inspect install steps. Practical next steps: 1) Review the complete scripts locally (you already have them) and search for any network calls, remote URLs, or obfuscation. The provided code appears local-only but double-check the truncated parts before running. 2) Run only after verifying file paths and changing hard-coded output paths to safe locations. 3) If you must run the daemon, inspect the generated wechat_assistant_state.json and ensure the token file is protected. Consider firewall/local policy controls to restrict access to the RPC port. 4) Prefer running in an isolated Windows VM or test account, and avoid running as administrator. If you are not comfortable inspecting or sandboxing, do not install from this unknown source.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cf2fzmjd9wwnt8tr2ax9v7x83kmk8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments