Scan Report
68 /100
recruit-email-monitor
招聘邮件监控系统 - 自动检查邮箱、记录到表格、飞书通知、每日简报
Hardcoded real email credentials (QQ and 163 authorization codes) are exposed in source code, enabling unauthorized account access to anyone who downloads this skill.
Do not install this skill
CRITICAL: Remove all hardcoded credentials from source code. Use environment variables or a secure config file instead. Rotate the exposed authorization codes immediately. The real credentials at lines 19 and 25 of email-heartbeat-check.py must be replaced with placeholders or externalized to a .env file.
Attack Chain 4 steps
⬡
Escalation Attacker clones/downloads the skill from repository
github.com/nhaoxi/recruit-email-monitor⬡
Escalation Attacker reads email-heartbeat-check.py and extracts hardcoded credentials
scripts/email-heartbeat-check.py:19◉
Impact Attacker uses extracted credentials to access QQ email ([email protected]) via POP3
scripts/email-heartbeat-check.py:19◉
Impact Attacker uses extracted credentials to access 163 email ([email protected]) via POP3
scripts/email-heartbeat-check.py:25Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Hardcoded QQ Email Authorization Code Credential Theft | scripts/email-heartbeat-check.py:19 |
| Critical | Hardcoded 163 Email Authorization Code Credential Theft | scripts/email-heartbeat-check.py:25 |
| High | Documentation Shows Placeholders, Code Contains Real Credentials Doc Mismatch | scripts/email-heartbeat-check.py:16 |
| High | Hardcoded Author Path Exposure Sensitive Access | scripts/email-heartbeat-check.py:51 |
| Medium | Hardcoded Feishu User ID Credential Theft | scripts/email-heartbeat-check.py:155 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ | ✓ Aligned | poplib.POP3_SSL connections to email servers (declared) |
| Filesystem | WRITE | WRITE | ✓ Aligned | openpyxl workbook saves, JSON writes to /home/erhao/.openclaw/ |
| Shell | WRITE | WRITE | ✓ Aligned | subprocess.run(['openclaw', 'message', 'send']) at lines 155, 281 |
4 findings
Info Email 邮箱地址
[email protected] README.md:51 Info Email 邮箱地址
[email protected] README.md:58 Info Email 邮箱地址
[email protected] scripts/email-heartbeat-check.py:20 Info Email 邮箱地址
[email protected] scripts/email-heartbeat-check.py:27 File Tree
7 files · 37.8 KB · 1267 lines Python 2f · 625L
Markdown 3f · 575L
JSON 2f · 67L
├─
▾
scripts
│ ├─
email-daily-briefing.py
Python
│ └─
email-heartbeat-check.py
Python
├─
_meta.json
JSON
├─
cron-jobs.json
JSON
├─
INSTALL.md
Markdown
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
openpyxl | * | pip | No | Version not pinned but widely used, no known vulnerabilities relevant to this use case |
Security Positives
✓ Subprocess usage for openclaw CLI is documented and declared
✓ No base64 encoding or obfuscation detected
✓ No reverse shell or C2 communication patterns
✓ No malicious dependencies detected (only openpyxl)
✓ No evidence of intentional data exfiltration beyond email monitoring purpose