可疑 — 风险评分 50/100
上次扫描:18 小时前 重新扫描
50 /100
OnionClaw
Tor-based dark web OSINT tool for searching .onion sites, rotating Tor identities, and conducting multi-step threat intelligence investigations
SKILL.md describes a Tor-based dark web OSINT tool with extensive capabilities, but all referenced implementation scripts (setup.py, check_tor.py, renew.py, search.py, fetch.py, pipeline.py, etc.) are missing—only documentation exists with no verifiable code.
技能名称OnionClaw
分析耗时54.0s
引擎pi
谨慎使用
Do not use this skill. Request the full implementation code (all referenced Python scripts) before any security assessment. The documented capabilities suggest filesystem:WRITE, network:READ, shell:WRITE, and environment:READ access, but without code, hidden malicious behavior cannot be ruled out.

安全发现 4 项

严重性 安全发现 位置
高危
Missing implementation code—only documentation present 文档欺骗
SKILL.md describes a full dark web OSINT tool and references 10+ Python scripts (setup.py, check_tor.py, renew.py, check_engines.py, search.py, fetch.py, ask.py, pipeline.py, sync_sicry.py, and bundled sicry.py), but none of these files exist. This is a severe doc-to-code mismatch making security verification impossible.
python3 {baseDir}/setup.py | python3 {baseDir}/check_tor.py | python3 {baseDir}/renew.py | python3 {baseDir}/check_engines.py | python3 {baseDir}/search.py | python3 {baseDir}/fetch.py | python3 {baseDir}/ask.py | python3 {baseDir}/pipeline.py
→ Do not use this skill. Request complete implementation code from the upstream repo (github.com/JacobJandon/OnionClaw) and audit all scripts before deployment.
SKILL.md:1
中危
Environment variable access declared without audit 敏感访问
SKILL.md explicitly states the tool uses 'python-dotenv' to read .env files containing LLM_API_KEY and other configuration. While reading .env is standard for tools needing API keys, the actual .env handling code is not present to audit.
pip: ['requests[socks]', 'beautifulsoup4', 'python-dotenv', 'stem']
→ If implementation is provided, verify .env is only read locally and credentials are not exfiltrated.
SKILL.md:24
中危
External code download from GitHub 供应链
SKILL.md describes a 'sync_sicry.py' script that pulls the 'Sicry' engine from github.com/JacobJandon/Sicry. This introduces supply chain risk—downstream code not reviewed in this package.
python3 {baseDir}/sync_sicry.py | Pull latest from upstream Sicry™ repo
→ If Sicry code is downloaded dynamically, this significantly expands the attack surface and trust requirements.
SKILL.md:273
低危
System Tor configuration modification 权限提升
setup.py is documented to modify /etc/tor/torrc for ControlPort, CookieAuthentication, and DataDirectory. This requires elevated privileges and modifies system configuration.
setup.py does this automatically. | Add to /etc/tor/torrc: ControlPort 9051
→ If implemented, verify setup.py only modifies the specified torrc entries and doesn't introduce backdoors or additional configuration.
SKILL.md:45
资源类型声明权限推断权限状态证据
文件系统 WRITE WRITE ✓ 一致 SKILL.md references --out FILE, --output-dir DIR, report writing
网络访问 READ READ ✓ 一致 SKILL.md: 'routes all requests through Tor', GitHub API calls for updates
命令执行 WRITE WRITE ✓ 一致 SKILL.md: 'python3 {baseDir}/setup.py', 'python3 {baseDir}/pipeline.py'
环境变量 READ READ ✓ 一致 SKILL.md: uses 'python-dotenv' to read .env for LLM keys, torrc paths
技能调用 NONE NONE No skill chaining declared
剪贴板 NONE NONE Not referenced
浏览器 NONE NONE Not referenced
数据库 NONE NONE Not referenced
1 项发现
🔗
中危 外部 URL 外部 URL
http://SOME.onion/path
SKILL.md:153

目录结构

1 文件 · 12.1 KB · 400 行
Markdown 1f · 400L
└─ 📝 SKILL.md Markdown 400L · 12.1 KB

安全亮点

✓ MIT-0 license indicates open-source intent
✓ STIX/MISP output formats suggest legitimate threat intelligence use case
✓ Skill documentation is thorough and well-structured
✓ No base64-encoded payloads or obfuscation observed in documentation
✓ No direct IP addresses or C2 indicators found in documentation