扫描报告
25 /100
mp4-to-mp3-extractor
批量将指定目录下的 .mp4 视频文件提取为 .mp3 音频文件
A legitimate MP4-to-MP3 converter with undocumented dynamic package installation and unpinned dependencies, but no malicious behavior detected.
可以安装
Declare subprocess/shell:WRITE in SKILL.md permissions, pin all dependency versions, and document the ffmpeg auto-download and venv creation behaviors.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Undeclared subprocess usage 文档欺骗 | SKILL.md:1 |
| 中危 | Undocumented dynamic package installation 文档欺骗 | scripts/extract.py:17 |
| 中危 | Unpinned dependencies with third-party mirror 供应链 | scripts/ensure_package.py:50 |
| 低危 | Undeclared ffmpeg binary download 文档欺骗 | scripts/extract.py:40 |
| 低危 | Undeclared virtual environment creation 文档欺骗 | scripts/config.py:22 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✗ 越权 | scripts/extract.py:41-50 subprocess.run for ffmpeg |
| 命令执行 | NONE | WRITE | ✗ 越权 | scripts/ensure_package.py:49-52 pip install subprocess |
| 命令执行 | NONE | WRITE | ✗ 越权 | scripts/env_manager.py:67 venv.create and pip upgrade |
| 文件系统 | READ | WRITE | ✗ 越权 | scripts/env_manager.py:70 creates venv directory |
| 文件系统 | READ | WRITE | ✗ 越权 | scripts/logger_manager.py:32 writes rotating log files |
3 项发现
中危 外部 URL 外部 URL
https://pypi.tuna.tsinghua.edu.cn/simple scripts/ensure_package.py:50 中危 外部 URL 外部 URL
https://download.pytorch.org/whl/cpu scripts/env_manager.py:148 中危 外部 URL 外部 URL
https://download.pytorch.org/whl/ scripts/env_manager.py:161 目录结构
8 文件 · 28.6 KB · 696 行 Python 5f · 556L
Markdown 2f · 96L
Ignore 1f · 44L
├─
▾
scripts
│ ├─
config.py
Python
│ ├─
ensure_package.py
Python
│ ├─
env_manager.py
Python
│ ├─
extract.py
Python
│ └─
logger_manager.py
Python
├─
.gitignore
Ignore
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 4 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
tqdm | * | pip | 否 | Version not pinned |
ffmpeg-downloader | * | pip | 否 | Version not pinned |
pydub | * | pip | 否 | Version not pinned |
pytorch | * | pip (commented) | 否 | Code present but commented out |
安全亮点
✓ No credential harvesting - environment variable access is limited to internal recursion control (RUNNING_IN_VENV)
✓ No network exfiltration - all network requests are to legitimate package mirrors (PyPI, gyan.dev)
✓ No obfuscation - all code is plaintext Python with clear docstrings
✓ No reverse shell or C2 communication
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ subprocess usage is legitimate CLI tool invocation (ffmpeg, pip, venv) appropriate for the stated purpose
✓ Error handling present with try-except blocks