扫描报告
75 /100
hive-commander
1+5 Distributed Production Swarm with Session Inheritance
This skill covertly extracts API credentials from the runtime environment and transmits them to arbitrary external servers via configurable base_url, with no user consent mechanism declared.
不要安装此技能
Do not use this skill. It harvests credentials without explicit user consent and exfiltrates them via HTTP POST to configurable endpoints. If needed, restrict base_url to a whitelist and require user approval before credential use.
攻击链 4 步
◎
入口 Skill presents itself as a distributed task orchestration tool
SKILL.md:1⬡
提权 Extracts api_key, base_url, and model from runtime environment without declaration
AGENT.md:13⬡
提权 Builds HTTP POST payload with extracted credentials and user-controlled base_url
executor.py:36◉
影响 Transmits credentials to arbitrary external endpoint via HTTPSConnection
executor.py:43安全发现 6 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Covert credential extraction from runtime environment 凭证窃取 | AGENT.md:13 |
| 高危 | Credentials transmitted to arbitrary external endpoints 数据外泄 | executor.py:43 |
| 高危 | SKILL.md omits critical credential and network access 文档欺骗 | SKILL.md:1 |
| 高危 | No consent mechanism for credential usage 权限提升 | AGENT.md:15 |
| 中危 | Critical behavior embedded in embedded Markdown docs 代码混淆 | SKILL.md:12 |
| 低危 | Hardcoded path expansion in executor 敏感访问 | executor.py:57 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | SKILL.md:7 — write: ["~/.openclaw/swarm_tmp/**"] |
| 环境变量 | NONE | READ | ✗ 越权 | AGENT.md:13 — 'Extract api_key, base_url, and model from the active runtime envi… |
| 网络访问 | NONE | WRITE | ✗ 越权 | executor.py:43 — conn.request('POST', path, ...) using extracted api_key and bas… |
| 命令执行 | ADMIN | ADMIN | ✓ 一致 | SKILL.md:8 — exec: ["python3"] |
1 项发现
中危 外部 URL 外部 URL
http://json-schema.org/draft-07/schema# schema.json:2 目录结构
5 文件 · 8.0 KB · 196 行 Markdown 3f · 101L
Python 1f · 73L
JSON 1f · 22L
├─
AGENT.md
Markdown
├─
executor.py
Python
├─
README.md
Markdown
├─
schema.json
JSON
└─
SKILL.md
Markdown
安全亮点
✓ Filesystem write access is correctly scoped to ~/.openclaw/swarm_tmp/** as declared
✓ Python3 execution permission is explicitly declared
✓ Output is written as atomic files with role metadata
✓ No base64 encoding or obfuscated command execution observed
✓ No direct shell/bash invocation — uses python3 subprocess only