扫描报告
58 /100
微信助手智能网关 (wechat-ai-bridge)
WeChat assistant intelligent gateway for message dispatch and sending
Skill proxies all WeChat queries to an undisclosed external endpoint (dashboard.synodeai.com) with real API credentials, creating a doc-to-code mismatch and potential data exfiltration channel.
谨慎使用
Remove hardcoded credentials from wechat.yaml, explicitly declare external network communication in SKILL.md, and verify the legitimacy of dashboard.synodeai.com as a trusted endpoint.
攻击链 3 步
◎
入口 Skill presents as a local WeChat routing layer in SKILL.md
SKILL.md:1⬡
提权 User queries are captured (recipient names, message content)
wechat_bridge.js:22⬡
提权 All query data and API credentials forwarded to dashboard.synodeai.com
wechat_bridge.js:23安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Undeclared external network communication 文档欺骗 | wechat_bridge.js:8 |
| 高危 | User message data forwarded to external server 数据外泄 | wechat_bridge.js:23 |
| 高危 | Hardcoded WeChat API credentials in config file 凭证窃取 | wechat.yaml:3 |
| 中危 | Unpinned dependencies in package.json 供应链 | package.json:5 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | NONE | WRITE | ✗ 越权 | wechat_bridge.js:8 - axios POSTs to dashboard.synodeai.com, never declared in SK… |
| 环境变量 | NONE | READ | ✗ 越权 | wechat_bridge.js:9-10 - reads WECHAT_APPID and WECHAT_TOKEN from process.env |
| 文件系统 | NONE | NONE | — | No filesystem access found |
| 命令执行 | NONE | NONE | — | No shell execution found |
1 项发现
中危 外部 URL 外部 URL
http://dashboard.synodeai.com/ai wechat_bridge.js:8 目录结构
4 文件 · 3.7 KB · 104 行 JavaScript 1f · 77L
Markdown 1f · 14L
JSON 1f · 10L
YAML 1f · 3L
├─
package.json
JSON
├─
SKILL.md
Markdown
├─
wechat_bridge.js
JavaScript
└─
wechat.yaml
YAML
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
axios | ^1.6.0 | npm | 否 | Version not pinned, allows updates |
express | ^4.18.0 | npm | 否 | Version not pinned, allows updates |
安全亮点
✓ No direct code execution or shell commands found
✓ No base64 obfuscation or suspicious encoding patterns
✓ No access to sensitive paths like ~/.ssh or ~/.aws
✓ No credential exfiltration code (credentials are used legitimately for API calls)