Wechat

v0.1.0

Extract and summarize publicly accessible WeChat shared pages including announcements, app info, and group invite details without login or private data access.

0· 129·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description align with the SKILL.md: all tasks refer to public WeChat share pages and summarization. However, the package has no homepage/source and limited provenance information (owner ID only), which reduces transparency though not necessarily functionality.
Instruction Scope
SKILL.md stays within scope (visit public share pages, extract title/author/time/body, summarize). It explicitly forbids login/privilege bypass. It does require waiting for dynamic content to render — but the skill declares no required binaries or helper tooling (e.g., headless browser), so it relies on the agent platform's browsing/rendering capability. There is no guidance on user-agent, rate limits, robots.txt, or anti-bot behavior.
Install Mechanism
Instruction-only skill with no install spec and no code files; nothing is written to disk or downloaded by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested — proportional for a public-page scraping/summarization skill.
Persistence & Privilege
always is false and autonomous invocation is allowed (platform default). The skill does not request persistent or cross-skill privileges.
Assessment
This skill appears to do what it claims and doesn't ask for credentials, but note: (1) provenance is limited — there's no homepage or source code to review, so consider trust implications before enabling; (2) it assumes the agent can render JavaScript-driven pages (headless browser) — confirm your platform supports that or the skill won't work as intended; (3) ensure scraping follows site terms, robots.txt, and rate limits to avoid blocking; and (4) watch for any future changes that add network endpoints or credential requests.

Like a lobster shell, security has layers — review code before you run it.

latestvk9778z4j177j5v51c1d9tz2wx18332cb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments