Weiyun

PassAudited by VirusTotal on May 10, 2026.

Overview

Type: OpenClaw Skill Name: weiyun Version: 1.0.0 The 'weiyun' skill bundle is a comprehensive MCP (Model Context Protocol) integration for Tencent Weiyun cloud storage. It provides tools for file management, including a specialized upload protocol requiring a custom SHA1 implementation (found in `scripts/upload_to_weiyun.py` and `scripts/gen_block_info_list.py`) to handle Weiyun's FTN streaming states. The authentication flow in `setup.sh` and `references/auth.md` is transparent, utilizing legitimate `weiyun.com` endpoints and requiring explicit user confirmation. While it includes a version-check mechanism that can receive update instructions from the server, this is a standard feature for skill maintenance rather than a malicious backdoor. No evidence of data exfiltration, unauthorized access, or malicious prompt injection was found.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A remote response could influence what the agent does before using the skill, including update actions the user has not reviewed.

Why it was flagged

The skill tells the agent to follow update instructions returned by a remote service, which can make unreviewed remote text authoritative.

Skill content
如果当前版本 `version` 低于最新版本 `latest`,则遵循 `instruction` 指令进行更新,或提示用户更新。
Recommendation

Treat remote update text as advisory only; require explicit user approval and preferably signed, pinned, or registry-verified updates before executing any update instructions.

What this means

An agent mistake or ambiguous user request could delete cloud files or directories, potentially permanently.

Why it was flagged

The skill exposes batch deletion, including permanent deletion, for the user's cloud-drive contents. The visible instructions do not require an explicit confirmation step before high-impact deletes.

Skill content
`weiyun.delete` — 批量删除 ... `delete_completely` ... true-彻底删除
Recommendation

Require the agent to show the exact files/directories and ask for explicit confirmation before deletion, especially when `delete_completely=true`.

What this means

Private cloud files or folders could be made accessible through a share link if the agent misinterprets the request.

Why it was flagged

The skill can create external share links, including passwordless links, but the visible artifacts do not require a confirmation or privacy warning before sharing.

Skill content
`weiyun.gen_share_link` — 为微云网盘中的文件或目录生成分享短链接 ... `passwd` ... 不填则创建无密码分享
Recommendation

Require explicit confirmation before generating share links, and warn when creating passwordless shares.

What this means

Anyone who can see local process arguments or command history may be able to recover the Weiyun token and access the user's cloud-drive account through this integration.

Why it was flagged

The documentation shows passing a high-value MCP token as a command-line argument, which can expose it through process listings, shell history, logs, or terminal recordings.

Skill content
python3 scripts/upload_to_weiyun.py /path/to/file --token <mcp_token>
Recommendation

Prefer environment variables, secure credential storage, or interactive secret prompts; avoid documenting or using `--token` for real tokens.

What this means

The local mcporter configuration can continue to authorize Weiyun actions after setup until the token is removed or revoked.

Why it was flagged

The setup script persists the Weiyun MCP token into a home-scoped mcporter configuration. This is purpose-aligned, but it is sensitive account access that users should understand.

Skill content
mcporter config add "$_WY_SERVICE_NAME" "$_WY_MCP_URL" ... --header "WyHeader=mcp_token=$token" --scope home
Recommendation

Clearly disclose where the token is stored, how to revoke it, and how to remove the mcporter configuration when the user no longer wants this access.

What this means

Running the setup may change the user's local environment and install code from package registries without the installation being declared up front.

Why it was flagged

The setup script can install a global npm package and an unpinned Python package even though the registry says there is no install spec and no required binaries.

Skill content
npm install -g mcporter@0.8.1 ... pip3 install requests 2>/dev/null || pip install requests 2>/dev/null
Recommendation

Declare these dependencies in the install metadata, ask before installing, avoid global installs where possible, and pin Python dependencies.