Scan Report
5 /100
zalo-multi-send
Send multiple images or files in a single Zalo message using zca-js directly
This is a legitimate Zalo multi-file sending utility that reads credentials locally for authentication and uses them only to send files via Zalo API—no exfiltration, no obfuscation, no unauthorized access.
Safe to install
No action needed. The skill is safe to use.
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | scripts/send.mjs:47-48 reads credentials.json; line 73 reads local files |
| Network | READ | READ | ✓ Aligned | scripts/send.mjs:68 uses fetch() to download URLs for attachments only |
| Environment | NONE | READ | ✓ Aligned | scripts/send.mjs:49 uses os.homedir() to locate credentials path |
| Shell | NONE | NONE | — | No subprocess or exec calls found |
| Skill Invoke | NONE | NONE | — | No recursive skill invocation |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser automation |
| Database | NONE | NONE | — | No database access |
2 findings
Medium External URL 外部 URL
https://files.catbox.moe/abc.png SKILL.md:42 Medium External URL 外部 URL
https://files.catbox.moe/def.png SKILL.md:42 File Tree
2 files · 6.2 KB · 163 lines JavaScript 1f · 105L
Markdown 1f · 58L
├─
▾
scripts
│ └─
send.mjs
JavaScript
└─
SKILL.md
Markdown
Security Positives
✓ Credentials used only for local Zalo API authentication, not exfiltrated
✓ URL fetching restricted to loading attachment files (not for C2 or data theft)
✓ No base64 encoding, obfuscation, or anti-analysis techniques
✓ No remote script execution (curl|bash, wget|sh)
✓ No subprocess or shell command execution
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env
✓ Clear documentation with accurate capability declarations
✓ Uses openclaw's credential management system as intended
✓ Hardcoded ZCA_PATH is a minor usability issue but not a security risk—it references the legitimate bundled zca-js library