Scan Report
15 /100
ai-daily
AI Daily - Fetch latest AI insights from RSS and push to webhook channels
Legitimate RSS-fetching and webhook-pushing skill with minor documentation issues; hardcoded IP (120.0.0.0) is a TEST-NET-1 documentation address with no active malicious behavior detected.
Safe to install
Replace the hardcoded IP address in scripts/fetch.sh with a domain name or environment variable to avoid confusion. No other security action is required.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | Hardcoded TEST-NET-1 IP address in fetch.sh Doc Mismatch | scripts/fetch.sh:29 |
| Low | Placeholder webhook tokens in documentation Doc Mismatch | SKILL.md:12 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ | ✓ Aligned | scripts/fetch.sh:41 urllib.request.urlopen(req) for RSS fetch |
| Shell | WRITE | WRITE | ✓ Aligned | scripts/fetch.sh:4 source command to load config |
| Environment | READ | READ | ✓ Aligned | scripts/fetch.sh:27 os.environ.get('AI_DAILY_WEBHOOKS') |
1 High 4 findings
High IP Address 硬编码 IP 地址
120.0.0.0 scripts/fetch.sh:29 Medium External URL 外部 URL
https://api.day.app/your-token SKILL.md:12 Medium External URL 外部 URL
https://other-webhook SKILL.md:12 Medium External URL 外部 URL
https://justlovemaki.github.io/CloudFlare-AI-Insight-Daily/rss.xml SKILL.md:18 File Tree
3 files · 6.5 KB · 215 lines Shell 2f · 142L
Markdown 1f · 73L
├─
▾
scripts
│ └─
fetch.sh
Shell
├─
config.sh
Shell
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
feedparser | unpinned | python3 stdlib or pip | No | feedparser is not imported via requirements.txt; the script relies on it being pre-installed |
urllib | stdlib | python3 built-in | No | Standard library, no risk |
Security Positives
✓ Skill behavior matches declared purpose: fetching RSS and pushing to user-configured webhooks
✓ All network requests target user-supplied webhook URLs (no hardcoded exfiltration endpoints)
✓ RSS source is a well-known public GitHub Pages repository
✓ No credential harvesting, no credential files accessed
✓ No obfuscation techniques detected (no base64, no eval, no encoded payloads)
✓ Python heredoc is used for RSS parsing, which is a legitimate and appropriate approach
✓ No supply chain risk: only standard library imports (feedparser, urllib, os, json, re)
✓ Webhook format detection logic is appropriate for the declared platforms (Bark, WeChat Work, Feishu, DingTalk)