扫描报告
20 /100
grafana-inspector
Grafana 自动化巡检技能。支持浏览器截图 + API 数据巡检,多仪表盘批量巡检,自动发现仪表盘
Grafana automation inspection skill with legitimate API-based monitoring behavior; minor documentation inconsistency (browser screenshot mentioned but not implemented) and SSL verification disabled, but no malicious functionality detected.
可以安装
Pin the requests library version, enable SSL verification (remove verify=False), and align SKILL.md documentation with actual implementation to eliminate misleading descriptions.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Documentation claims browser screenshot capability not implemented 文档欺骗 | SKILL.md:4 |
| 中危 | SSL verification disabled in HTTP requests 敏感访问 | scripts/inspection_report.py:77 |
| 低危 | No pinned dependency versions 供应链 | scripts/api_inspect.py:6 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | scripts/api_inspect.py:26 requests.get(...) |
| 文件系统 | WRITE | WRITE | ✓ 一致 | scripts/main.py:53 open(json_path, 'w') |
| 命令执行 | NONE | NONE | — | No subprocess/shell calls found |
| 环境变量 | NONE | NONE | — | No os.environ access |
| 技能调用 | NONE | NONE | — | No skill_invoke calls found |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | READ | NONE | ✓ 一致 | SKILL.md line 4: '支持浏览器截图' but no browser automation code in any .py file |
| 数据库 | NONE | NONE | — | No database access |
2 项发现
中危 外部 URL 外部 URL
https://grafana/d/ SKILL.md:68 中危 外部 URL 外部 URL
http://127.0.0.1:3000 scripts/config.json:2 目录结构
7 文件 · 29.4 KB · 929 行 Python 3f · 800L
Markdown 2f · 108L
JSON 2f · 21L
├─
▾
scripts
│ ├─
api_inspect.py
Python
│ ├─
config.example.json
JSON
│ ├─
config.json
⚠
JSON
│ ├─
inspection_report.py
Python
│ └─
main.py
Python
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | unspecified | import | 否 | No requirements.txt or version pin; library used in api_inspect.py and inspection_report.py |
安全亮点
✓ All network operations are directed at the user-configured Grafana URL, which is expected behavior
✓ No credential harvesting — API key is used as Bearer token for legitimate Grafana API calls
✓ No obfuscation techniques (base64, eval, atob) found
✓ No subprocess/shell execution detected
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No data exfiltration — all results are written to local files only
✓ No persistence mechanisms (cron, startup hooks, backdoors) detected
✓ No prompt injection instructions found