Scan Report
20 /100
grafana-inspector
Grafana 自动化巡检技能。支持浏览器截图 + API 数据巡检,多仪表盘批量巡检,自动发现仪表盘
Grafana automation inspection skill with legitimate API-based monitoring behavior; minor documentation inconsistency (browser screenshot mentioned but not implemented) and SSL verification disabled, but no malicious functionality detected.
Safe to install
Pin the requests library version, enable SSL verification (remove verify=False), and align SKILL.md documentation with actual implementation to eliminate misleading descriptions.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | Documentation claims browser screenshot capability not implemented Doc Mismatch | SKILL.md:4 |
| Medium | SSL verification disabled in HTTP requests Sensitive Access | scripts/inspection_report.py:77 |
| Low | No pinned dependency versions Supply Chain | scripts/api_inspect.py:6 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ | ✓ Aligned | scripts/api_inspect.py:26 requests.get(...) |
| Filesystem | WRITE | WRITE | ✓ Aligned | scripts/main.py:53 open(json_path, 'w') |
| Shell | NONE | NONE | — | No subprocess/shell calls found |
| Environment | NONE | NONE | — | No os.environ access |
| Skill Invoke | NONE | NONE | — | No skill_invoke calls found |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | READ | NONE | ✓ Aligned | SKILL.md line 4: '支持浏览器截图' but no browser automation code in any .py file |
| Database | NONE | NONE | — | No database access |
2 findings
Medium External URL 外部 URL
https://grafana/d/ SKILL.md:68 Medium External URL 外部 URL
http://127.0.0.1:3000 scripts/config.json:2 File Tree
7 files · 29.4 KB · 929 lines Python 3f · 800L
Markdown 2f · 108L
JSON 2f · 21L
├─
▾
scripts
│ ├─
api_inspect.py
Python
│ ├─
config.example.json
JSON
│ ├─
config.json
⚠
JSON
│ ├─
inspection_report.py
Python
│ └─
main.py
Python
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requests | unspecified | import | No | No requirements.txt or version pin; library used in api_inspect.py and inspection_report.py |
Security Positives
✓ All network operations are directed at the user-configured Grafana URL, which is expected behavior
✓ No credential harvesting — API key is used as Bearer token for legitimate Grafana API calls
✓ No obfuscation techniques (base64, eval, atob) found
✓ No subprocess/shell execution detected
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No data exfiltration — all results are written to local files only
✓ No persistence mechanisms (cron, startup hooks, backdoors) detected
✓ No prompt injection instructions found