Scan Report
20 /100
wechat-reader
读取微信公众号文章内容,返回标题、公众号名、发布时间和正文
A legitimate WeChat public account article scraping tool using only Python standard library; no malicious behavior confirmed, but contains suspicious hardcoded IP address in User-Agent with no evidence of actual exfiltration.
Safe to install
Acceptable for use as a web scraping utility. The hardcoded IP address (120.0.0.0) should be removed from the User-Agent string to eliminate ambiguity.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Suspicious hardcoded IP address in User-Agent Data Exfil | scripts/read_wechat.py:22 |
| Low | Undeclared network capability Doc Mismatch | SKILL.md:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | NONE | READ | ✓ Aligned | scripts/read_wechat.py:20-24 urllib.request.Request + urlopen |
| Filesystem | NONE | NONE | — | No filesystem access detected |
| Shell | NONE | NONE | — | No subprocess or shell invocation |
1 High 1 findings
High IP Address 硬编码 IP 地址
120.0.0.0 scripts/read_wechat.py:22 File Tree
2 files · 5.9 KB · 177 lines Python 1f · 139L
Markdown 1f · 38L
├─
▾
scripts
│ └─
read_wechat.py
Python
└─
SKILL.md
Markdown
Security Positives
✓ Uses only Python standard library (urllib.request, re, json, html) — no external dependencies
✓ No credential harvesting or environment variable access
✓ No subprocess or shell command execution
✓ No base64, eval, or obfuscation techniques
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No persistence mechanisms (cron, startup hooks, backdoors)
✓ Request goes only to user-supplied mp.weixin.qq.com URLs
✓ No data exfiltration to external servers observed
✓ Functionality matches stated purpose in SKILL.md