扫描报告
70 /100
VLAN Linux Client Skill
Manages VLAN.CN virtual networking Linux client installation, configuration, and operations
Skill instructs users to pipe a remote script from an unverified source into bash with SSL verification disabled (-k flag), enabling trivial man-in-the-middle attack and arbitrary code execution on the target system.
不要安装此技能
Do not use this skill. The installation method (curl|sh with -k) is a textbook supply-chain attack vector. If a legitimate VLAN client is needed, install it only through official distribution channels with integrity verification (GPG signatures, checksums).
攻击链 4 步
⬡
提权 Attacker performs MITM on network path to dl.vlan.cn or compromises the domain
SKILL.md:17⬡
提权 Attacker serves a malicious install.sh script instead of the legitimate one
SKILL.md:17⬡
提权 User executes 'curl -kfsSL http://dl.vlan.cn/vlan2.0/linux/install.sh | sh' — malicious script runs as root
SKILL.md:17◉
影响 Attacker gains full root access: backdoor installation, credential theft, persistence, lateral movement
SKILL.md:17安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Remote script piped to bash without integrity verification 供应链 | SKILL.md:17 |
| 严重 | SSL certificate verification disabled in installation command 供应链 | SKILL.md:17 |
| 高危 | Encourages passing passwords as plaintext command-line arguments 凭证窃取 | SKILL.md:26 |
| 中危 | Dangerous shell command reference in documentation body 文档欺骗 | SKILL.md:193 |
2 严重 5 项发现
严重 危险命令 危险 Shell 命令
curl -kfsSL http://dl.vlan.cn/vlan2.0/linux/install.sh | sh README.md:17 严重 危险命令 危险 Shell 命令
rm -rf / SKILL.md:193 中危 外部 URL 外部 URL
http://dl.vlan.cn/vlan2.0/linux/install.sh README.md:17 中危 外部 URL 外部 URL
https://www.vlan.cn/guide/linux-client README.md:56 中危 外部 URL 外部 URL
https://www.vlan.cn README.md:57 目录结构
2 文件 · 6.0 KB · 257 行 Markdown 2f · 257L
├─
README.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ No executable code/scripts present in the skill — pure documentation only
✓ Skill does not declare any allowed tools beyond documented CLI commands
✓ No environment variable access, no file writes, no network calls from skill code
✓ The skill correctly recommends login-code authentication over password-in-command