Scan Report
20 /100
davinci-auto-editor
Cloud-driven DaVinci Resolve automation skill that scans local media, requests a cloud editing plan, and generates a Resolve-importable EDL package with pure Node.
DaVinci Resolve automation skill with legitimate cloud API integration, no shell execution, and no credential harvesting. A hardcoded external IP in example config is the primary concern.
Safe to install
Accept for use but replace the hardcoded IP in config with a proper domain name or environment variable. Consider pinning the external API endpoint in production deployments.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Hardcoded external IP address in example configuration | examples/config.example.json:2 |
| Low | API key transmitted in Authorization header | scripts/index.js:175 |
| Low | Material paths sent to external cloud API | scripts/index.js:41 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | scripts/index.js:36 - Recursive media scan; writes EDL, JSON, and report files t… |
| Network | READ | READ | ✓ Aligned | scripts/index.js:156-183 - ApiClient class uses fetch() to GET/POST cloud API en… |
| Shell | NONE | NONE | — | No child_process, exec, spawn, or shell invocation found in codebase |
| Environment | NONE | NONE | — | No os.environ iteration or credential extraction from environment variables |
1 High 2 findings
High IP Address 硬编码 IP 地址
43.137.46.105 examples/config.example.json:2 Medium External URL 外部 URL
http://43.137.46.105:8787 examples/config.example.json:2 File Tree
8 files · 25.3 KB · 821 lines JavaScript 1f · 470L
Markdown 2f · 181L
JSON 3f · 166L
YAML 1f · 4L
├─
▾
agents
│ └─
openai.yaml
YAML
├─
▾
assets
│ └─
icon.svg
├─
▾
examples
│ └─
config.example.json
JSON
├─
▾
scripts
│ └─
index.js
JavaScript
├─
manifest.json
JSON
├─
package.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No shell execution capability - no child_process, exec, spawn, or shell invocation found
✓ No credential harvesting from environment variables or sensitive paths (~/.ssh, ~/.aws, .env)
✓ No base64-encoded payloads or eval() with decoded content
✓ No reverse shell, C2 communication, or data exfiltration beyond declared cloud API calls
✓ No hidden instructions in HTML comments or disguised payloads
✓ Code is straightforward and performs exactly what SKILL.md describes
✓ Error handling includes best-effort fallback reporting without exposing sensitive data
✓ API key is only used for declared cloud API authentication, not exfiltrated elsewhere