Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Baoyu Post To Wechat
v0.1.1Posts content to WeChat Official Account (微信公众号) via API or Chrome CDP. Supports article posting (文章) with HTML, markdown, or plain text input, and image-tex...
⭐ 0· 64·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description claim posting to WeChat via API or Chrome CDP and require bun or npx — which matches the documented scripts. However, the package is instruction-only and does not include the referenced scripts (scripts/*.ts). That makes the declared capability impossible to execute as provided and is incoherent: a posting skill that requires local scripts but ships none.
Instruction Scope
SKILL.md explicitly instructs the agent to read and write local EXTEND.md files (project or user paths), access Chrome profile paths, operate on local markdown/images, and run browser automation to paste content. Those actions involve reading/writing files and interacting with a local Chrome profile. The instructions also mandate a blocking first-time setup. Given there are no scripts included, the instructions would either fail or push the agent/user to fetch or run external code — scope and operational details are broader than the registry metadata implies.
Install Mechanism
There is no install spec (instruction-only), which is low-risk in itself. However, because the SKILL.md expects to run local TypeScript scripts with bun/npx, the lack of an install step or included scripts is inconsistent. If the user obtains the referenced code from the external homepage, that download would need review (no install/source provided here).
Credentials
The registry declares no required env vars, which matches the package metadata. The skill, however, recommends storing WeChat AppID/AppSecret in EXTEND.md (project or user config) to enable API mode. Requesting those credentials is proportionate to the stated purpose, but storing secrets in plaintext config files and granting the skill read/write access to home/project paths increases risk and should be considered carefully.
Persistence & Privilege
always is false and the skill does not request elevated registry privileges. It does instruct creating and reading a per-skill EXTEND.md under project or user home directories, which is a normal configuration pattern and scoped to this skill.
What to consider before installing
Do not install or run this skill as-is. The SKILL.md expects local TypeScript scripts (scripts/*.ts) and to run them via bun or npx, but this package contains only documentation — the executable code is missing. Before trusting or using the skill: 1) Inspect the referenced repository/homepage (https://github.com/JimLiu/baoyu-skills#baoyu-post-to-wechat) and verify the exact scripts that will be executed; 2) Review those scripts for network endpoints, credential handling, and any data-exfiltration behavior; 3) If you use API mode, avoid storing AppID/AppSecret in a world-readable file; prefer secure storage or environment variables with appropriate filesystem permissions; 4) Be cautious about allowing automation to use your Chrome profile — consider creating a dedicated profile with limited data; 5) If you cannot review the referenced code, treat this skill as untrusted because the documentation alone cannot be executed and may prompt you to fetch or run external code. If you want help reviewing the actual scripts from the GitHub repo, provide them and I can re-evaluate.Like a lobster shell, security has layers — review code before you run it.
latestvk97erxmn68sn4y5qj0q3zd0fc583cv2t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Any binbun, npx
