Wechat Sendmedia

v1.0.0

send images and files to a wechat conversation through openclaw's wechat channel. use when the user asks to send a local image, send a screenshot, send a dow...

0· 17·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md, and included scripts all focus on preparing a structured local-file media envelope for the openclaw-weixin channel and diagnosing send failures. Required files, file-path handling, and the account-token lookup are coherent with a host-side diagnostics workflow.
Instruction Scope
Instructions stay within the declared channel scope and the workflow is narrowly defined (validate local file, build envelope, optionally run debug script on failure). The debug script reads host account files under ~/.openclaw/openclaw-weixin/accounts to check for context tokens; this is reasonable for diagnosis but means debug runs will access local config and may reveal file paths and presence of tokens in diagnostic output.
Install Mechanism
No install spec or external downloads — instruction-only with bundled scripts. The scripts are small, local, and require no additional packages beyond a Python runtime and Node.js, which is proportional.
Credentials
The skill declares no required env vars or credentials. The Node debug script reads process.env.HOME to locate ~/.openclaw/openclaw-weixin/accounts; this is justified for diagnosing Weixin context-token presence but does probe local account files, which could contain secrets (the script does not print token contents but does indicate file paths and presence).
Persistence & Privilege
Skill is not always-enabled, does not request persistent system changes, and does not modify other skills or system-wide configs. It only reads files when invoked.
Assessment
This skill appears to do what it says: build structured 'file://' media envelopes for the openclaw-weixin channel and run local diagnostics if a send fails. Before installing, note two practical points: (1) the debug helper inspects your home directory under ~/.openclaw/openclaw-weixin/accounts to check for context tokens — it does not exfiltrate token values in its output but will report file paths and token presence, so avoid running diagnostics if you don't want that exposure; (2) the host runtime must map the returned file:// URLs into actual media sends (the skill relies on the host to perform the network/upload step). If you need stronger assurances, review the two bundled scripts yourself to confirm they meet your privacy requirements and only run the debug step when necessary.

Like a lobster shell, security has layers — review code before you run it.

filevk978cg2ec3h92mn62bw13wdv4984ahedimagevk978cg2ec3h92mn62bw13wdv4984ahedlatestvk978cg2ec3h92mn62bw13wdv4984ahedmediavk978cg2ec3h92mn62bw13wdv4984ahedopenclaw-weixinvk978cg2ec3h92mn62bw13wdv4984ahedwechatvk978cg2ec3h92mn62bw13wdv4984ahed

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments