Scan Report
45 /100
browser-automation
浏览器自动化操作与网页交互技能
This browser automation skill contains a hardcoded billing API key and extensive anti-detection documentation, presenting moderate security concerns without confirmed malicious behavior.
Use with caution
Review and remove hardcoded credentials from payment.py. The anti-detection documentation raises concerns but appears designed for legitimate web scraping use cases. Consider adding explicit permission declarations for network access used by the billing system.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Hardcoded billing API key exposed in source code | payment.py:12 |
| Medium | Extensive anti-detection documentation | references/anti-detection-guide.md:1 |
| Medium | Undeclared network API calls for billing | payment.py:29 |
| Low | Automation detection bypass flags | scripts/auto_login.py:24 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✓ Aligned | Scripts read/write data files (scraped_data.json, cookies) - legitimate for data… |
| Network | READ | READ+WRITE | ✓ Aligned | payment.py makes POST requests to skillpay.me for billing - not declared in SKIL… |
| Shell | NONE | NONE | — | No subprocess/shell execution found |
| Browser | WRITE | WRITE | ✓ Aligned | Browser automation using Playwright - properly documented |
2 High 8 findings
High API Key 疑似硬编码凭证
API_KEY = "sk_f03aa8f8bbcf79f7aa11c112d904780f22e62add1464e3c41a79600a451eb1d2" payment.py:12 High IP Address 硬编码 IP 地址
120.0.0.0 references/anti-detection-guide.md:49 Medium External URL 外部 URL
https://search.jd.com/Search?keyword=iPhone SKILL.md:100 Medium External URL 外部 URL
https://skillpay.me payment.py:11 Medium External URL 外部 URL
https://target-site.com references/anti-detection-guide.md:177 Medium External URL 外部 URL
http://2captcha.com/in.php references/automation-patterns.md:416 Medium External URL 外部 URL
http://2captcha.com/res.php?key= references/automation-patterns.md:427 Medium External URL 外部 URL
https://hooks.slack.com/... scripts/page_monitor.py:13 File Tree
14 files · 82.9 KB · 3051 lines Markdown 6f · 1781L
Python 6f · 1230L
Text 1f · 21L
JSON 1f · 19L
├─
▾
references
│ ├─
anti-detection-guide.md
Markdown
│ ├─
anti-detection.md
Markdown
│ ├─
automation-patterns.md
Markdown
│ ├─
browser-tools-reference.md
Markdown
│ └─
playwright-guide.md
Markdown
├─
▾
scripts
│ ├─
auto_login.py
Python
│ ├─
data_scraper.py
Python
│ ├─
form_filler.py
Python
│ ├─
page_monitor.py
Python
│ └─
web_scraper.py
Python
├─
_meta.json
JSON
├─
payment.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
Dependencies 3 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
playwright | >=1.40.0 | pip | No | Version pinned with minimum |
requests | >=2.31.0 | pip | No | Used for billing HTTP calls |
beautifulsoup4 | >=4.12.0 | pip | No |
Security Positives
✓ Skill has clear, documented purpose (browser automation) aligned with implementation
✓ No evidence of credential harvesting from target systems
✓ No reverse shell, C2 communication, or data exfiltration detected
✓ Web scraping capabilities appear consistent with declared purpose
✓ Dependencies use reasonable versions (playwright>=1.40.0)