Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

给微信的联系人或者群发送信息

v1.0.2

Windows 电脑端微信消息自动发送技能,通过键盘模拟给指定联系人发送消息。快捷命令:wt

0· 195·0 current·0 all-time
by返璞归真@zhangpuego123

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for zhangpuego123/wechat-talk.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "给微信的联系人或者群发送信息" (zhangpuego123/wechat-talk) from ClawHub.
Skill page: https://clawhub.ai/zhangpuego123/wechat-talk
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install wechat-talk

ClawHub CLI

Package manager switcher

npx clawhub@latest install wechat-talk
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Functionality in send_batch.py and server.py matches the description: keyboard simulation (pyautogui/pyperclip) to open WeChat, search contacts, paste and send messages. However, requirements.txt includes OCR/Computer Vision packages (pytesseract, opencv-python) that are not used by the provided code, which is disproportionate to the stated simple keyboard-simulation purpose. Also package/owner metadata in _meta.json and .clawhub/origin.json do not match the registry metadata (different ownerId and slug), which is inconsistent with the claimed source.
Instruction Scope
SKILL.md and scripts instruct the agent/user to run local Python scripts that will activate the WeChat window and simulate keystrokes — this is appropriate for the stated task. The code reads/writes a local queue file (send_queue.json) and may read test_config.json if present. There are no instructions to read unrelated user files or environment variables. Important: server.py implements a JSON-RPC stdin/stdout tool interface so an agent/process can call wechat_send_message and wechat_get_status programmatically; that enables silent/autonomous sending of messages if invoked by an agent or another process.
Install Mechanism
No install spec in registry (instruction-only), so nothing is automatically downloaded. A requirements.txt is included that pulls several third-party Python packages. The presence of unused heavy deps (pytesseract, opencv-python) increases attack surface and is not justified by SKILL.md or code; this is a maintenance/security concern but not direct evidence of maliciousness.
Credentials
The skill requests no environment variables, credentials, or external endpoints. That is proportionate to its purpose of local GUI automation. No secrets appear to be requested or used.
!
Persistence & Privilege
The skill exposes a long-running MCP-style tool loop (reads JSON requests on stdin and performs actions). With model invocation enabled (default), an agent could call the tool to send messages without explicit user prompts. Autonomous invocation alone isn’t always a problem, but combined with metadata inconsistencies and unexplained dependencies it raises the risk that the skill could be used to send messages unexpectedly. always:false mitigates some risk, but you should treat enabling autonomous calls carefully.
What to consider before installing
This skill appears to do what it says (simulate keyboard to send WeChat messages), but I recommend caution: 1) Verify the package origin — _meta.json and .clawhub/origin.json metadata differ from the registry metadata (ownerId/slug mismatch). 2) Inspect and remove any unnecessary dependencies (pytesseract, opencv) before installing — they increase attack surface. 3) Be aware server.py runs a JSON-RPC stdin/stdout loop that allows programmatic calls to send messages; do not allow autonomous model invocation or untrusted processes to call it if you don't want unattended sending. 4) Review any local test_config.json before running (it can change recipients). 5) Run first in a safe/test environment and observe behavior; avoid running while you are actively using the machine (the tool injects keystrokes). If you need help verifying the metadata or trimming dependencies, obtain the original upstream source or ask the publisher for clarification before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk9738tx0jvbj97fqdd1tvj4e9983km38
195downloads
0stars
3versions
Updated 1mo ago
v1.0.2
MIT-0

WeChat Talk

Windows 电脑端微信消息自动发送技能。

功能

  • 👤 搜索并打开联系人聊天窗口
  • ✉️ 给指定联系人发送消息
  • 🔄 批量发送(智能优化执行步骤)
  • ⌨️ 纯键盘模拟,无需 API
  • ⚡ 快捷命令:wt

安装

需要先安装 Python 依赖:

pip install pyautogui pygetwindow pillow pyperclip

使用方法

1. 单人发送

python send_batch.py "[张三]" "消息内容"

2. 批量发送(轮询模式)

# 初始化并发送第一条
python send_batch.py "[张三,李四,王五]" "消息内容"

# 继续发送下一条
python send_batch.py --next

# 继续发送下一条
python send_batch.py --next

注意: 联系人格式必须为 [A,B,C] 格式

3. 快捷命令

wt [张三] 消息内容
wt [张三,李四] 消息内容

执行流程

标准步骤

步骤操作快捷键/方法延迟
1打开微信Ctrl+Shift+X1.0s
2打开搜索Ctrl+F0.3s
3输入联系人名称Ctrl+ADeleteCtrl+V0.5s
4打开聊天窗口Enter0.5s
5粘贴消息Ctrl+V0.3s
6发送消息Enter0.3s

智能执行逻辑

场景位置执行步骤说明
单人发送唯一Step 1-6完整流程
多人发送第一个人Step 1-6完整流程
多人发送后续人员Step 2-6跳过打开微信

效率优化: 多人发送时,后续人员跳过打开微信步骤,提升发送效率。

输入格式

联系人格式

必须为 [A,B,C] 格式

✅ 正确示例:

python send_batch.py "[张三]" "消息"
python send_batch.py "[张三,李四]" "消息"

❌ 错误示例:

python send_batch.py "张三" "消息"      # 缺少括号
python send_batch.py "张三,李四" "消息"  # 缺少括号

错误时返回:请输入正确的发送人格式

注意事项

  1. 微信 PC 客户端需要已安装并登录
  2. 发送消息时会自动激活微信窗口
  3. 中文输入需要确保系统中文输入法正常工作
  4. 执行过程中不要干扰键盘操作
  5. 批量发送时请保持窗口打开状态,不要手动关闭
  6. 联系人格式必须为 [A,B,C] 格式

文件结构

wechat-talk/
├── server.py       # 核心实现
├── send_batch.py   # 批量发送脚本
├── requirements.txt
├── send_queue.json # 批量队列(临时)
└── SKILL.md

Comments

Loading comments...