Scan Report
15 /100
flyai-packing-list
场景化智能行李清单生成器。根据目的地、出行日期、出行目的和同行人,结合 FlyAI 实时搜索目的地信息,生成个性化分类行李清单
Purely documentation-based skill with no executable code. Minor security concern around NODE_TLS_REJECT_UNAUTHORIZED=0 usage, but this is documented and necessary for FlyAI CLI functionality in certain network environments.
Safe to install
Accept for use. Consider documenting the TLS bypass rationale and ensuring FlyAI CLI is from a trusted source.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | User profile file access Sensitive Access | reference/user-profile-storage.md:45 |
| Low | TLS verification bypass documented Supply Chain | SKILL.md:82 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | SKILL.md: Reads ~/.flyai/user-profile.md for user preferences |
| Network | READ | READ | ✓ Aligned | SKILL.md: Calls FlyAI CLI for search operations |
| Shell | WRITE | WRITE | ✓ Aligned | SKILL.md: Executes npm install and flyai commands via shell |
| Environment | READ | READ | ✓ Aligned | SKILL.md: Sets NODE_TLS_REJECT_UNAUTHORIZED=0 environment variable |
4 findings
Medium External URL 外部 URL
https://nodejs.org/ SKILL.md:57 Medium External URL 外部 URL
https://registry.npmmirror.com SKILL.md:59 Medium External URL 外部 URL
https://img.alicdn.com/... reference/search-hotel.md:44 Medium External URL 外部 URL
https://img.alicdn.com/tfscom/... reference/search-poi.md:32 File Tree
11 files · 25.8 KB · 888 lines Markdown 11f · 888L
├─
▾
reference
│ ├─
ai-search.md
Markdown
│ ├─
keyword-search.md
Markdown
│ ├─
search-flight.md
Markdown
│ ├─
search-hotel.md
Markdown
│ ├─
search-marriott-hotel.md
Markdown
│ ├─
search-marriott-package.md
Markdown
│ ├─
search-poi.md
Markdown
│ ├─
search-train.md
Markdown
│ ├─
tools.md
Markdown
│ └─
user-profile-storage.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ Pure documentation skill with no executable code (100% Markdown files)
✓ All declared capabilities align with inferred capabilities
✓ No credential harvesting or data exfiltration detected
✓ No obfuscation techniques present
✓ No access to sensitive system paths (~/.ssh, ~/.aws, .env)
✓ No base64-encoded payloads or eval() calls
✓ No reverse shell or C2 communication patterns
✓ User profile storage is appropriate for a travel assistant skill