扫描报告
27 /100
Apple iCloud Suite
Apple iCloud 全套服务操作:日历、照片、iCloud Drive、设备查找、提醒事项
Legitimate iCloud management suite with minor documentation inconsistencies and credential handling concerns, but no confirmed malicious behavior. The status_wall daemon adds persistence risk that should be documented.
可以安装
Document the subprocess daemon behavior in SKILL.md. Standardize password usage guidance across scripts (main password vs app-specific password confusion). Consider pinning dependency versions.
安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Inconsistent credential type documentation 文档欺骗 | scripts/icloud-photos.py, scripts/icloud-notes.py, scripts/icloud-reminders.py:8 |
| 中危 | Background daemon with undeclared persistence 权限提升 | scripts/status_wall.py:152 |
| 低危 | Dependency versions not pinned 供应链 | SKILL.md:25 |
| 低危 | No allowed-tools declaration in SKILL.md 文档欺骗 | SKILL.md:17 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | WRITE | ✓ 一致 | scripts/status_wall.py writes to ~/.status_wall.json, ~/.status_wall.pid, ~/.sta… |
| 网络访问 | NONE | READ | ✓ 一致 | Scripts make outbound API calls to iCloud (caldav.icloud.com, pyicloud) and Amap… |
| 环境变量 | NONE | READ | ✓ 一致 | All scripts read ICLOUD_USERNAME, ICLOUD_PASSWORD, ICLOUD_APP_PASSWORD, ICLOUD_C… |
| 命令执行 | NONE | WRITE | ✓ 一致 | status_wall.py:152 — subprocess.Popen spawns daemon; icloud_calendar.py:update_c… |
1 高危 10 项发现
高危 API 密钥 疑似硬编码凭证
PASSWORD="xxxx-xxxx-xxxx-xxxx" QUICKSTART.md:80 中危 外部 URL 外部 URL
https://appleid.apple.com README.md:97 中危 外部 URL 外部 URL
https://lbs.amap.com/ README.md:98 中危 外部 URL 外部 URL
https://vdirsyncer.pimutils.org/ SKILL.md:125 中危 外部 URL 外部 URL
https://khal.readthedocs.io/ SKILL.md:126 中危 外部 URL 外部 URL
https://todoman.readthedocs.io/ SKILL.md:127 中危 外部 URL 外部 URL
https://caldav.icloud.com/ evals/results/calendar-with-skill.md:5 中危 外部 URL 外部 URL
https://restapi.amap.com/v3/geocode/regeo? scripts/status_wall.py:335 提示 邮箱 邮箱地址
[email protected] QUICKSTART.md:24 提示 邮箱 邮箱地址
[email protected] scripts/icloud-notes.py:142 目录结构
18 文件 · 95.7 KB · 3153 行 Python 7f · 2128L
Markdown 10f · 1019L
JSON 1f · 6L
├─
▾
config-templates
│ └─
todoman-config.py
Python
├─
▾
evals
│ └─
▾
results
│ ├─
calendar-with-skill.md
Markdown
│ └─
calendar-without-skill.md
Markdown
├─
▾
references
│ ├─
calendar.md
Markdown
│ ├─
drive.md
Markdown
│ ├─
findmy.md
Markdown
│ ├─
photos.md
Markdown
│ └─
scripts.md
Markdown
├─
▾
scripts
│ ├─
icloud_calendar.py
Python
│ ├─
icloud_tool.py
Python
│ ├─
icloud-notes.py
Python
│ ├─
icloud-photos.py
Python
│ ├─
icloud-reminders.py
Python
│ └─
status_wall.py
Python
├─
_meta.json
JSON
├─
QUICKSTART.md
Markdown
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 4 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
pyicloud | unpinned | pip | 否 | Open-source library, version not pinned |
caldav | unpinned | pip | 否 | Open-source CalDAV library, version not pinned |
icalendar | unpinned | pip | 否 | Open-source iCalendar library, version not pinned |
icloudpd | unpinned | pip | 否 | Optional dependency for batch photo download, version not pinned |
安全亮点
✓ All credential inputs are read from environment variables or interactive prompts, not hardcoded in source
✓ pyicloud is a well-known, publicly documented open-source library (not a custom implant)
✓ No base64-encoded strings, obfuscation, or anti-analysis techniques detected
✓ No ~/.ssh, ~/.aws, .env, or other sensitive credential path access
✓ No curl|bash remote script execution or eval() calls
✓ 2FA validation is enforced before accessing sensitive iCloud data
✓ Credentials are only transmitted to legitimate Apple iCloud and Amap API endpoints (HTTPS)
✓ Status wall writes to user-specified shared calendar, not hidden storage