扫描报告
20 /100
landing-page-angle-tester
针对同一产品生成多种 landing page 叙事角度,并标注适配人群和证据要求
A legitimate landing-page copywriting skill with mostly clean code; a minor doc-to-code mismatch exists where filesystem WRITE via script output is not declared in SKILL.md frontmatter.
可以安装
Add filesystem:WRITE to SKILL.md frontmatter's allowed-tools mapping since scripts/run.py writes output files. Otherwise the skill is safe and suitable for use.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Undeclared filesystem WRITE capability 文档欺骗 | scripts/run.py:262 |
| 低危 | Shell execution referenced in body but not frontmatter 文档欺骗 | SKILL.md:31 |
| 提示 | Credential-pattern scanning in pattern_audit mode 敏感访问 | scripts/run.py:150 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | WRITE | ✗ 越权 | scripts/run.py:262 — output_path.write_text(rendered) |
| 命令执行 | NONE | WRITE | ✗ 越权 | SKILL.md:31 — '如运行环境允许 shell / exec,可使用 python3 scripts/run.py ...' |
| 网络访问 | NONE | NONE | — | No network calls in run.py; only file I/O and regex scanning |
| 环境变量 | NONE | NONE | — | run.py imports os but only for Path operations; no os.environ iteration |
| 技能调用 | NONE | NONE | — | No inter-skill invocation |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser automation |
| 数据库 | NONE | NONE | — | No database access |
1 项发现
中危 外部 URL 外部 URL
https://example.invalid/skills/landing-page-angle-tester SKILL.md:6 目录结构
9 文件 · 20.6 KB · 561 行 Python 1f · 282L
Markdown 7f · 243L
JSON 1f · 36L
├─
▾
examples
│ ├─
example-input.md
Markdown
│ └─
example-output.md
Markdown
├─
▾
resources
│ ├─
spec.json
JSON
│ └─
template.md
Markdown
├─
▾
scripts
│ └─
run.py
Python
├─
▾
tests
│ └─
smoke-test.md
Markdown
├─
README.md
Markdown
├─
SELF_CHECK.md
Markdown
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
python3 (stdlib only) | any | stdlib | 否 | No third-party packages — uses only Python standard library (argparse, csv, json, os, re, sys, pathlib, collections) |
安全亮点
✓ No external network requests or C2 communication detected
✓ No base64-encoded execution, eval(), or obfuscation present
✓ No curl|bash or wget|sh remote script execution
✓ No credential harvesting or exfiltration — PATTERNS are for scanning, not stealing
✓ No hidden HTML content or prompt injection detected
✓ No unauthorized access to ~/.ssh, ~/.aws, .env, or other sensitive paths
✓ Python standard library only — no third-party dependencies
✓ Script is well-structured with proper argument parsing and error handling
✓ Intentions clearly documented: read-only by default, explicit dry-run support
✓ SELF_CHECK.md self-assessment correctly identifies the skill's safe nature