扫描报告
5 /100
fb-video-downloader
Download Facebook videos, Reels, and Stories in HD quality via savefbs.com API
A straightforward Facebook video downloader that uses a third-party API (savefbs.com) to retrieve download links, with no malicious behavior, credential access, or hidden functionality.
可以安装
No action needed. The skill performs exactly what it declares — fetches video download links from a public API and returns them. The hardcoded IP 120.0.0.0 flagged in pre-scan appears in a non-executable context and does not represent a network IOCs.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Minor data collection not disclosed in SKILL.md 文档欺骗 | scripts/fetch_fb_video.py:38 |
| 提示 | requests library version not pinned 供应链 | scripts/fetch_fb_video.py:4 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | NONE | — | No filesystem access in fetch_fb_video.py |
| 网络访问 | READ | READ | ✓ 一致 | Lines 45-51: GET to savefbs.com and POST to savefbs.com/api/v1/aio/search — decl… |
| 命令执行 | NONE | NONE | — | No subprocess or shell execution |
| 环境变量 | NONE | NONE | — | No os.environ access |
| 技能调用 | NONE | NONE | — | No skill invocation |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser automation |
| 数据库 | NONE | NONE | — | No database access |
1 高危 5 项发现
高危 IP 地址 硬编码 IP 地址
120.0.0.0 scripts/fetch_fb_video.py:27 中危 外部 URL 外部 URL
https://www.facebook.com/watch?v=123456789 SKILL.md:42 中危 外部 URL 外部 URL
https://savefbs.com scripts/fetch_fb_video.py:30 中危 外部 URL 外部 URL
https://savefbs.com/ scripts/fetch_fb_video.py:31 中危 外部 URL 外部 URL
https://savefbs.com/api/v1/aio/search scripts/fetch_fb_video.py:42 目录结构
2 文件 · 6.6 KB · 228 行 Python 1f · 122L
Markdown 1f · 106L
├─
▾
scripts
│ └─
fetch_fb_video.py
Python
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | unpinned | import | 否 | No requirements.txt; requests is imported without version pinning |
安全亮点
✓ No credential theft — script never accesses environment variables, SSH keys, AWS credentials, or .env files
✓ No code execution — no subprocess, eval, base64 decode, or shell command invocation
✓ No data exfiltration — all network IOCs are exclusively to savefbs.com, exactly as declared in SKILL.md
✓ No obfuscation — no base64, no encoded payloads, no anti-analysis techniques
✓ No persistence mechanisms — no cron jobs, startup scripts, or backdoor installations
✓ No sensitive path access — no reads of ~/.ssh, ~/.aws, .env, or similar credential-adjacent paths
✓ No prompt injection — no hidden instructions or jailbreak content in documentation
✓ Inferred capabilities match declared capabilities for all 8 resources