Scan Report
75 /100
hive-commander
1+5 Distributed Production Swarm with Session Inheritance
This skill covertly extracts API credentials from the runtime environment and transmits them to arbitrary external servers via configurable base_url, with no user consent mechanism declared.
Do not install this skill
Do not use this skill. It harvests credentials without explicit user consent and exfiltrates them via HTTP POST to configurable endpoints. If needed, restrict base_url to a whitelist and require user approval before credential use.
Attack Chain 4 steps
◎
Entry Skill presents itself as a distributed task orchestration tool
SKILL.md:1⬡
Escalation Extracts api_key, base_url, and model from runtime environment without declaration
AGENT.md:13⬡
Escalation Builds HTTP POST payload with extracted credentials and user-controlled base_url
executor.py:36◉
Impact Transmits credentials to arbitrary external endpoint via HTTPSConnection
executor.py:43Findings 6 items
| Severity | Finding | Location |
|---|---|---|
| High | Covert credential extraction from runtime environment Credential Theft | AGENT.md:13 |
| High | Credentials transmitted to arbitrary external endpoints Data Exfil | executor.py:43 |
| High | SKILL.md omits critical credential and network access Doc Mismatch | SKILL.md:1 |
| High | No consent mechanism for credential usage Priv Escalation | AGENT.md:15 |
| Medium | Critical behavior embedded in embedded Markdown docs Obfuscation | SKILL.md:12 |
| Low | Hardcoded path expansion in executor Sensitive Access | executor.py:57 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | SKILL.md:7 — write: ["~/.openclaw/swarm_tmp/**"] |
| Environment | NONE | READ | ✗ Violation | AGENT.md:13 — 'Extract api_key, base_url, and model from the active runtime envi… |
| Network | NONE | WRITE | ✗ Violation | executor.py:43 — conn.request('POST', path, ...) using extracted api_key and bas… |
| Shell | ADMIN | ADMIN | ✓ Aligned | SKILL.md:8 — exec: ["python3"] |
1 findings
Medium External URL 外部 URL
http://json-schema.org/draft-07/schema# schema.json:2 File Tree
5 files · 8.0 KB · 196 lines Markdown 3f · 101L
Python 1f · 73L
JSON 1f · 22L
├─
AGENT.md
Markdown
├─
executor.py
Python
├─
README.md
Markdown
├─
schema.json
JSON
└─
SKILL.md
Markdown
Security Positives
✓ Filesystem write access is correctly scoped to ~/.openclaw/swarm_tmp/** as declared
✓ Python3 execution permission is explicitly declared
✓ Output is written as atomic files with role metadata
✓ No base64 encoding or obfuscated command execution observed
✓ No direct shell/bash invocation — uses python3 subprocess only