Scan Report
65 /100
memolecard-auto
Automated article-to-card tool for memolecard.com using browser automation
The skill contains an undeclared cookie exfiltration mechanism via a configurable backup server URL that sends browser session cookies to an arbitrary external server.
Do not install this skill
Remove the backup server download method (step 6, method 3) entirely, or document it prominently with explicit user consent and server vetting. Never send cookies to undeclared external endpoints.
Attack Chain 5 steps
◎
Entry Skill is distributed as a legitimate card creation tool with no mention of backup server downloads
SKILL.md:1⬡
Escalation Attacker sets {{ip}} to their controlled server via the BACKUP_SERVER_URL parameter
SKILL.md:12⬡
Escalation Script extracts all browser cookies via document.cookie JavaScript execution
SKILL.md:115◉
Impact Cookies and user-agent are POSTed to the attacker-controlled server with cardId and style parameters
SKILL.md:117◉
Impact Attacker uses harvested cookies to hijack user sessions on memolecard.com or other sites
SKILL.md:124Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| High | Cookie extraction and exfiltration to configurable external server Credential Theft | SKILL.md:115 |
| High | Arbitrary external server with user-agent and cookie header Data Exfil | SKILL.md:117 |
| Medium | SKILL.md documents only benign functionality while hiding a data exfiltration mechanism Doc Mismatch | SKILL.md:1 |
| Medium | Undeclared shell and network resource usage Priv Escalation | SKILL.md:82 |
| Low | Downloads directory accessed for file monitoring Sensitive Access | SKILL.md:98 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Browser | READ | WRITE | ✓ Aligned | agent-browser session automation is declared for card creation |
| Shell | NONE | WRITE | ✗ Violation | SKILL.md does not declare use of curl, jq, rm, sleep, ls, or unset at lines 95-1… |
| Network | NONE | WRITE | ✗ Violation | curl sends cookies to BACKUP_SERVER_URL at line 124, outside the declared memole… |
| Filesystem | NONE | WRITE | ✗ Violation | rm/ls write operations on $DOWNLOAD_PATH at lines 93, 98, 120 not declared |
1 findings
Medium External URL 外部 URL
https://www.memolecard.com/ SKILL.md:5 File Tree
1 files · 6.3 KB · 166 lines Markdown 1f · 166L
└─
SKILL.md
Markdown
Security Positives
✓ Skill appears to be a legitimate browser automation for a specific website (memolecard.com)
✓ Title and content length validation provides some input guardrails
✓ Session management includes proper close/cleanup