扫描报告
62 /100
Email Analyzer
Analyzes, backs up, and deletes emails from [email protected] based on keyword filtering
The skill contains hardcoded credentials (email authorization code) in plaintext within source code and documentation, presenting significant credential exposure risk if the repository becomes public or is shared.
不要安装此技能
Remove hardcoded credentials from source code. Use environment variables or a secrets manager (e.g., .env file with .gitignore) to store the authorization code. The SKILL.md should reference environment variables rather than exposing the actual credential.
攻击链 3 步
⬡
提权 Attacker obtains repository or accesses skill files
SKILL.md:1⬡
提权 Attacker extracts hardcoded authorization code from email_analyzer.py CONFIG
email_analyzer.py:17◉
影响 Attacker gains unauthorized access to [email protected] mailbox using harvested credentials
N/A安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Hardcoded Email Authorization Code 凭证窃取 | email_analyzer.py:17 |
| 高危 | Credentials Exposed in Documentation 文档欺骗 | SKILL.md:18 |
| 中危 | Email Content Access Without User Consent Flow 敏感访问 | view_email.py:1 |
| 低危 | Credentials Not Pinned in Dependencies 凭证窃取 | email_analyzer.py:6 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | IMAPClient connects to imap.126.com for email access |
| 文件系统 | WRITE | WRITE | ✓ 一致 | Writes JSON backup files and analysis reports |
| 命令执行 | WRITE | WRITE | ✓ 一致 | Shell script wraps Python execution; all documented |
1 项发现
提示 邮箱 邮箱地址
[email protected] SKILL.md:12 目录结构
9 文件 · 33.0 KB · 1174 行 Python 7f · 856L
Markdown 1f · 211L
Shell 1f · 107L
├─
backup.py
Python
├─
delete_selective.py
Python
├─
delete.py
Python
├─
email_analyzer.py
Python
├─
email-analyzer.sh
Shell
├─
SKILL.md
Markdown
├─
verify.py
Python
├─
view_details.py
Python
└─
view_email.py
Python
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
imapclient | unpinned | pip import | 否 | No requirements.txt or version constraint found |
安全亮点
✓ No reverse shell or C2 infrastructure detected
✓ No data exfiltration to external IPs beyond legitimate IMAP connection
✓ All shell operations are documented and necessary for the stated purpose
✓ Deletion operations require explicit --confirm flag and manual 'yes' input
✓ Backup functionality preserves data before deletion
✓ No obfuscation techniques (base64, eval) detected
✓ IMAP connection is to legitimate 126.com server only