daily-learning-card

PassAudited by VirusTotal on May 10, 2026.

Findings (1)

The skill bundle exhibits high-risk behavior by exfiltrating raw user session logs to an external Aliyun DashScope API using a hardcoded API key in `scripts/refine-memory.js`. It also contains a hardcoded Feishu message target (`oc_961ed2e84e1c196a9598dc6414d92ea6`) in `daily-learning-cards.sh` and `weekly-summary-cron.sh`, which could lead to sensitive data being sent to an unauthorized third-party channel if the user does not override the default configuration. While these features facilitate the stated goal of AI-driven summarization, the transmission of private conversation data to external endpoints (dashscope.aliyuncs.com) constitutes a major security and privacy risk.