Scan Report
45 /100
self-evolution-engine
自我进化引擎 - AI Skill自我分析、自我改进、自我学习能力
Skill contains a hardcoded API key for billing integration that is not properly declared in documentation, representing undeclared credential handling with potential for unauthorized charges.
Use with caution
Replace hardcoded API key with environment variable reference (SKILLPAY_API_KEY). Add clear documentation about billing integration and network API calls in SKILL.md.
Attack Chain 2 steps
⬡
Escalation Attacker examines skill and extracts hardcoded API key from payment.py
payment.py:12◉
Impact Attacker uses extracted API key to make unauthorized charges to skillpay.me billing API
payment.py:44Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Hardcoded API Key | payment.py:12 |
| Medium | Undeclared Network Communication | SKILL.md:1 |
| Low | Credential Stored in Version Control | payment.py:12 |
| Info | Billing Logic Auto-execution | payment.py:67 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✓ Aligned | Used for logs, backups, snapshots, evolution patches - declared in feature set |
| Network | NONE | READ | ✗ Violation | payment.py:25-67 makes requests to skillpay.me API with API key - not declared i… |
| Shell | NONE | NONE | — | No subprocess or shell execution detected |
| Environment | NONE | READ | ✓ Aligned | Reads SKILLPAY_USER_ID from environment for billing - legitimate use case |
1 High 2 findings
High API Key 疑似硬编码凭证
API_KEY = "sk_f03aa8f8bbcf79f7aa11c112d904780f22e62add1464e3c41a79600a451eb1d2" payment.py:12 Medium External URL 外部 URL
https://skillpay.me payment.py:11 File Tree
9 files · 56.0 KB · 1662 lines Python 5f · 1300L
Markdown 2f · 329L
JSON 1f · 19L
Text 1f · 14L
├─
▾
references
│ └─
architecture.md
Markdown
├─
▾
scripts
│ ├─
error_analyzer.py
Python
│ ├─
evolution_generator.py
Python
│ ├─
performance_monitor.py
Python
│ └─
version_manager.py
Python
├─
_meta.json
JSON
├─
payment.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
Dependencies 5 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requests | * | pip | No | Standard HTTP library, no specific vulnerabilities |
python-dateutil | >=2.8.0 | pip | No | Version pinned |
pandas | >=2.0.0 | pip | No | Optional dependency for advanced analysis |
psutil | >=5.9.0 | pip | No | Optional dependency for monitoring |
matplotlib | >=3.7.0 | pip | No | Optional dependency for reporting |
Security Positives
✓ No shell/subprocess execution detected - legitimate Python-only implementation
✓ No sensitive path access (no ~/.ssh, ~/.aws, .env file reading for theft)
✓ No base64 encoded commands or obfuscated payloads
✓ No data exfiltration mechanisms detected
✓ Version management includes backup/restore with human approval for changes
✓ Evolution system requires --confirm flag for applying patches
✓ No eval() or dangerous code execution patterns