扫描报告
20 /100
opencron
Visual cron job dashboard for OpenClaw — live countdown timers, run history, calendar view
OpenCron is a legitimate cron job dashboard skill with undeclared network fetch and filesystem write permissions, but all functionality serves the stated purpose with no malicious indicators.
可以安装
Consider documenting the network:READ and filesystem:WRITE permissions in SKILL.md for full transparency. The skill is safe to use.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Network fetch not documented in SKILL.md | serve.py:17 |
| 低危 | Filesystem write to system path not documented | update_canvas.py:59 |
| 提示 | Background shell loop | watch_sync.sh:5 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | READ | ✓ 一致 | serve.py:28 reads ~/.openclaw/cron/jobs.json |
| 文件系统 | NONE | WRITE | ✗ 越权 | update_canvas.py:59-63 writes to /app/dist/control-ui/cron.html |
| 网络访问 | NONE | READ | ✗ 越权 | serve.py:17 urllib.request.urlopen(https://raw.githubusercontent.com/...) |
| 命令执行 | NONE | WRITE | ✓ 一致 | watch_sync.sh:6 runs in infinite loop; bin/install.js:18 uses execFileSync |
3 项发现
中危 外部 URL 外部 URL
http://www.w3.org/2000/svg demo.html:276 中危 外部 URL 外部 URL
http://0.0.0.0: serve.py:115 提示 邮箱 邮箱地址
[email protected] demo.html:345 目录结构
9 文件 · 61.7 KB · 1272 行 HTML 1f · 799L
Python 3f · 275L
Markdown 2f · 118L
JavaScript 1f · 60L
JSON 1f · 11L
Shell 1f · 9L
├─
▾
bin
│ └─
install.js
JavaScript
├─
demo.html
HTML
├─
generate.py
Python
├─
package.json
JSON
├─
README.md
Markdown
├─
serve.py
Python
├─
SKILL.md
Markdown
├─
update_canvas.py
Python
└─
watch_sync.sh
Shell
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
python3 | unspecified | system | 否 | Standard library only (urllib, json, pathlib, http.server) |
node | unspecified | system | 否 | Uses only built-in modules: fs, path, child_process |
安全亮点
✓ No credential harvesting or environment variable iteration for secrets
✓ No data exfiltration or external IP communication except documented GitHub fetch
✓ No base64 encoded payloads or obfuscated shell commands
✓ No remote code execution beyond running local Python scripts
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env files
✓ No curl|bash or wget|sh remote script execution patterns
✓ No hidden instructions in HTML comments or other steganographic patterns
✓ GitHub source is a branded, human-readable repository (firstfloris/opencron)
✓ All file operations are scoped to the OpenClaw application directory (~/.openclaw/)