Wechat Formatter
Analysis
This appears to be a simple local Markdown-to-WeChat text formatter, with no evidence of network access, credential use, hidden behavior, or destructive actions.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
mkdir -p ~/.openclaw/skills/wechat-formatter cp wechat_formatter.py ~/.openclaw/skills/wechat-formatter/ ln -sf ~/.openclaw/skills/wechat-formatter/wechat_formatter.py ~/.openclaw/bin/wechat-formatter
The included installer writes the formatter into the OpenClaw skills directory and creates a command symlink, even though the registry section says there is no install spec.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
wechat-formatter ~/.openclaw/workspace/memory/2026-03-09-day2.md | pbcopy
The documentation gives a user-directed example that reads a file from an OpenClaw memory/workspace path and copies the formatted result to the clipboard.
