Trusted — Risk Score 5/100
Last scan:23 hr ago Rescan
5 /100
zalo-multi-send
Send multiple images or files in a single Zalo message using zca-js directly
This is a legitimate Zalo multi-file sending utility that reads credentials locally for authentication and uses them only to send files via Zalo API—no exfiltration, no obfuscation, no unauthorized access.
Skill Namezalo-multi-send
Duration23.5s
Enginepi
Safe to install
No action needed. The skill is safe to use.
ResourceDeclaredInferredStatusEvidence
Filesystem READ READ ✓ Aligned scripts/send.mjs:47-48 reads credentials.json; line 73 reads local files
Network READ READ ✓ Aligned scripts/send.mjs:68 uses fetch() to download URLs for attachments only
Environment NONE READ ✓ Aligned scripts/send.mjs:49 uses os.homedir() to locate credentials path
Shell NONE NONE No subprocess or exec calls found
Skill Invoke NONE NONE No recursive skill invocation
Clipboard NONE NONE No clipboard access
Browser NONE NONE No browser automation
Database NONE NONE No database access
2 findings
🔗
Medium External URL 外部 URL
https://files.catbox.moe/abc.png
SKILL.md:42
🔗
Medium External URL 外部 URL
https://files.catbox.moe/def.png
SKILL.md:42

File Tree

2 files · 6.2 KB · 163 lines
JavaScript 1f · 105L Markdown 1f · 58L
├─ 📁 scripts
│ └─ 📜 send.mjs JavaScript 105L · 4.2 KB
└─ 📝 SKILL.md Markdown 58L · 2.0 KB

Security Positives

✓ Credentials used only for local Zalo API authentication, not exfiltrated
✓ URL fetching restricted to loading attachment files (not for C2 or data theft)
✓ No base64 encoding, obfuscation, or anti-analysis techniques
✓ No remote script execution (curl|bash, wget|sh)
✓ No subprocess or shell command execution
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env
✓ Clear documentation with accurate capability declarations
✓ Uses openclaw's credential management system as intended
✓ Hardcoded ZCA_PATH is a minor usability issue but not a security risk—it references the legitimate bundled zca-js library