Scan Report
70 /100
VLAN Linux Client Skill
Manages VLAN.CN virtual networking Linux client installation, configuration, and operations
Skill instructs users to pipe a remote script from an unverified source into bash with SSL verification disabled (-k flag), enabling trivial man-in-the-middle attack and arbitrary code execution on the target system.
Do not install this skill
Do not use this skill. The installation method (curl|sh with -k) is a textbook supply-chain attack vector. If a legitimate VLAN client is needed, install it only through official distribution channels with integrity verification (GPG signatures, checksums).
Attack Chain 4 steps
⬡
Escalation Attacker performs MITM on network path to dl.vlan.cn or compromises the domain
SKILL.md:17⬡
Escalation Attacker serves a malicious install.sh script instead of the legitimate one
SKILL.md:17⬡
Escalation User executes 'curl -kfsSL http://dl.vlan.cn/vlan2.0/linux/install.sh | sh' — malicious script runs as root
SKILL.md:17◉
Impact Attacker gains full root access: backdoor installation, credential theft, persistence, lateral movement
SKILL.md:17Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Remote script piped to bash without integrity verification Supply Chain | SKILL.md:17 |
| Critical | SSL certificate verification disabled in installation command Supply Chain | SKILL.md:17 |
| High | Encourages passing passwords as plaintext command-line arguments Credential Theft | SKILL.md:26 |
| Medium | Dangerous shell command reference in documentation body Doc Mismatch | SKILL.md:193 |
2 Critical 5 findings
Critical Dangerous Command 危险 Shell 命令
curl -kfsSL http://dl.vlan.cn/vlan2.0/linux/install.sh | sh README.md:17 Critical Dangerous Command 危险 Shell 命令
rm -rf / SKILL.md:193 Medium External URL 外部 URL
http://dl.vlan.cn/vlan2.0/linux/install.sh README.md:17 Medium External URL 外部 URL
https://www.vlan.cn/guide/linux-client README.md:56 Medium External URL 外部 URL
https://www.vlan.cn README.md:57 File Tree
2 files · 6.0 KB · 257 lines Markdown 2f · 257L
├─
README.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No executable code/scripts present in the skill — pure documentation only
✓ Skill does not declare any allowed tools beyond documented CLI commands
✓ No environment variable access, no file writes, no network calls from skill code
✓ The skill correctly recommends login-code authentication over password-in-command