扫描报告
65 /100
face-analysis
中医面诊分析工具 (TCM Face Analysis Tool) - claims to only perform video-based health analysis
This TCM face-analysis skill contains hardcoded database credentials, undeclared database connectivity, and hidden token management functionality not documented in SKILL.md.
不要安装此技能
Remove all hardcoded credentials from config files, implement proper secret management, and update SKILL.md to accurately declare all database and token management capabilities.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Hardcoded Database Credentials in config.yaml 凭证窃取 | skills/scripts/common/config.yaml:4 |
| 高危 | Hardcoded Feishu App Secret 凭证窃取 | skills/scripts/common/config.yaml:15 |
| 高危 | Undeclared Database Connectivity and Token Management 文档欺骗 | skills/scripts/common/dao.py:54 |
| 高危 | Database Passwords in Test/Dev Configs with Special Characters 供应链 | skills/scripts/common/config-test.yaml:1 |
| 中危 | Environment Variable Reading for User Identification 敏感访问 | skills/scripts/common/config.py:195 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | scripts/face_analysis.py - file upload via multipart/form-data |
| 网络访问 | READ | WRITE | ✗ 越权 | skills/scripts/common/dao.py:45 - database WRITE to MySQL server |
| 数据库 | NONE | WRITE | ✗ 越权 | skills/scripts/common/dao.py:54-180 - Full CRUD operations on sys_user table |
2 高危 9 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY = "your-api-key-here" README.md:11 高危 IP 地址 硬编码 IP 地址
172.31.16.2 skills/scripts/common/config.yaml:4 中危 外部 URL 外部 URL
https://your-api-server.com/api/v1/face-analysis README.md:10 中危 外部 URL 外部 URL
http://livemonitortest.lifeemergence.com/smyx-open-api skills/scripts/common/config-dev.yaml:4 中危 外部 URL 外部 URL
https://healthtest.lifeemergence.com/jeecg-boot skills/scripts/common/config-dev.yaml:5 中危 外部 URL 外部 URL
http://192.168.1.234:8080/jeecg-boot skills/scripts/common/config-dev.yaml:6 中危 外部 URL 外部 URL
https://open.lifeemergence.com/smyx-open-api skills/scripts/common/config.yaml:5 中危 外部 URL 外部 URL
https://lifeemergence.com/jeecg-boot skills/scripts/common/config.yaml:6 提示 邮箱 邮箱地址
[email protected] skills/scripts/common/config-dev.yaml:3 目录结构
21 文件 · 76.2 KB · 2036 行 Python 12f · 1590L
Markdown 3f · 286L
Text 1f · 127L
YAML 5f · 33L
├─
▾
references
│ └─
api_doc.md
Markdown
├─
▾
scripts
│ ├─
__init__.py
Python
│ ├─
api_service.py
Python
│ ├─
config.py
Python
│ ├─
config.yaml
YAML
│ ├─
face_analysis.py
Python
│ └─
skill.py
Python
├─
▾
skills
│ └─
▾
scripts
│ └─
▾
common
│ ├─
__init__.py
Python
│ ├─
api_service.py
Python
│ ├─
base.py
Python
│ ├─
config-dev.yaml
YAML
│ ├─
config-prod.yaml
YAML
│ ├─
config-test.yaml
YAML
│ ├─
config.py
Python
│ ├─
config.yaml
YAML
│ ├─
dao.py
Python
│ └─
util.py
Python
├─
__init__.py
Python
├─
README.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 4 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | 2.32.5 | pip | 否 | Version pinned - good practice |
sqlalchemy | 2.0.46 | pip | 否 | Version pinned - good practice |
pymysql | 1.1.2 | pip | 否 | Version pinned - good practice |
cryptography | 3.4.8 | pip | 否 | Version not latest but stable release |
安全亮点
✓ No shell execution (subprocess) detected - skill uses only Python libraries
✓ No base64-encoded payloads or obfuscation techniques observed
✓ No direct IP address network requests to suspicious endpoints
✓ No attempts to access ~/.ssh, ~/.aws, or other sensitive home directory files
✓ No curl|bash or wget|sh remote script execution patterns
✓ Legitimate API-based face analysis functionality as documented