低风险 — 风险评分 20/100
上次扫描:19 小时前 重新扫描
20 /100
cute-kitten-generator
Generate high-detail cute kitten/animal images using ComfyUI local workflow
A legitimate ComfyUI image-generation skill that makes a local curl POST to a ComfyUI server, with no malicious patterns found. Minor doc-to-code mismatch on declared vs. actual resource usage.
技能名称cute-kitten-generator
分析耗时34.5s
引擎pi
可以安装
No immediate action needed. Consider adding explicit declared permissions (network:WRITE, filesystem:READ) to SKILL.md for transparency.

安全发现 2 项

严重性 安全发现 位置
低危
Undeclared shell and network execution 文档欺骗
SKILL.md declares all resources as NONE, yet the skill executes a curl POST to a local ComfyUI server (http://127.0.0.1:8188/prompt) and reads the JSON workflow file from disk. Both are functional requirements but undeclared.
curl -X POST -H "Content-Type: application/json" -d '{"prompt": '"$(cat cute_kitten_sofa.json)"'}' http://127.0.0.1:8188/prompt
→ Add explicit allowed-tools declaration: Read→filesystem:READ, Bash→network:WRITE+shell:WRITE. Document the local ComfyUI API call in the capability section.
SKILL.md:16
低危
Hardcoded personal paths and phone number 文档欺骗
SKILL.md contains hardcoded references to /Users/lobster/.openclaw/workspace and a phone number +17704012443. These are not security issues per se but represent personal information that may not be relevant to all users.
/Users/lobster/.openclaw/workspace/ComfyUI
→ Use environment variables or workspace-relative paths instead of hardcoded user directories.
SKILL.md:22
资源类型声明权限推断权限状态证据
文件系统 NONE READ ✓ 一致 SKILL.md:22 — cat cute_kitten_sofa.json reads workflow file; scripts/cute_kitten…
网络访问 NONE WRITE ✓ 一致 SKILL.md:16 — curl -X POST http://127.0.0.1:8188/prompt
命令执行 NONE WRITE ✓ 一致 SKILL.md:22 — curl|bash usage via shell execution for API call
1 项发现
🔗
中危 外部 URL 外部 URL
http://127.0.0.1:8188/prompt
SKILL.md:16

目录结构

2 文件 · 3.8 KB · 118 行
Markdown 1f · 59L JSON 1f · 59L
├─ 📁 scripts
│ └─ 📋 cute_kitten_sofa.json JSON 59L · 2.1 KB
└─ 📝 SKILL.md Markdown 59L · 1.8 KB

安全亮点

✓ No base64, obfuscation, or eval() patterns found
✓ No credential harvesting or environment variable iteration
✓ No remote script execution (curl|bash pattern is absent — curl POSTs to a local server only)
✓ No sensitive file access (~/.ssh, ~/.aws, .env)
✓ No persistence mechanisms (no cron, startup hooks, or backdoors)
✓ No C2 communication or external data exfiltration
✓ JSON workflow is a standard ComfyUI pipeline with no embedded malicious payloads
✓ The ComfyUI server target is explicitly 127.0.0.1 (localhost), indicating local-only operation