扫描报告
50 /100
OnionClaw
Tor-based dark web OSINT tool for searching .onion sites, rotating Tor identities, and conducting multi-step threat intelligence investigations
SKILL.md describes a Tor-based dark web OSINT tool with extensive capabilities, but all referenced implementation scripts (setup.py, check_tor.py, renew.py, search.py, fetch.py, pipeline.py, etc.) are missing—only documentation exists with no verifiable code.
谨慎使用
Do not use this skill. Request the full implementation code (all referenced Python scripts) before any security assessment. The documented capabilities suggest filesystem:WRITE, network:READ, shell:WRITE, and environment:READ access, but without code, hidden malicious behavior cannot be ruled out.
安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Missing implementation code—only documentation present 文档欺骗 | SKILL.md:1 |
| 中危 | Environment variable access declared without audit 敏感访问 | SKILL.md:24 |
| 中危 | External code download from GitHub 供应链 | SKILL.md:273 |
| 低危 | System Tor configuration modification 权限提升 | SKILL.md:45 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | SKILL.md references --out FILE, --output-dir DIR, report writing |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md: 'routes all requests through Tor', GitHub API calls for updates |
| 命令执行 | WRITE | WRITE | ✓ 一致 | SKILL.md: 'python3 {baseDir}/setup.py', 'python3 {baseDir}/pipeline.py' |
| 环境变量 | READ | READ | ✓ 一致 | SKILL.md: uses 'python-dotenv' to read .env for LLM keys, torrc paths |
| 技能调用 | NONE | NONE | — | No skill chaining declared |
| 剪贴板 | NONE | NONE | — | Not referenced |
| 浏览器 | NONE | NONE | — | Not referenced |
| 数据库 | NONE | NONE | — | Not referenced |
1 项发现
中危 外部 URL 外部 URL
http://SOME.onion/path SKILL.md:153 目录结构
1 文件 · 12.1 KB · 400 行 Markdown 1f · 400L
└─
SKILL.md
Markdown
安全亮点
✓ MIT-0 license indicates open-source intent
✓ STIX/MISP output formats suggest legitimate threat intelligence use case
✓ Skill documentation is thorough and well-structured
✓ No base64-encoded payloads or obfuscation observed in documentation
✓ No direct IP addresses or C2 indicators found in documentation