扫描报告
5 /100
tracebit-canaries
Deploys Tracebit security canaries (decoy/honeytoken credentials) to detect credential theft, prompt injection, and data exfiltration against AI agent workspaces. Includes human-supervised incident response.
The Tracebit Canaries skill is a legitimate defensive security tool with comprehensive documentation, strong human-gating controls, and transparent behavior — no malicious patterns, hidden functionality, or undeclared capabilities detected.
可以安装
No action required. This skill is safe to use. Ensure human confirmation gates are respected during deployment.
安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Install script has duplicate shebang at end of file | scripts/install-tracebit.sh:263 |
| 提示 | Hardcoded IP 1.2.3.4 in API reference documentation | references/api-reference.md:108 |
| 提示 | attacker.com URL is a legitimate educational example | references/attack-patterns.md:17 |
| 提示 | Script reads ~/.config/tracebit/canaries.json for status fallback | scripts/check-canaries.sh:44 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | SKILL.md declares fs:write for /tmp/tracebit-setup-creds and memory/security-inc… |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md declares browser (community.tracebit.com, GitHub) and email access — bo… |
| 命令执行 | WRITE | WRITE | ✓ 一致 | SKILL.md references bash scripts; install-tracebit.sh handles CLI binary install… |
| 环境变量 | NONE | NONE | — | No environment variable iteration or credential reading; TRACEBIT_API_TOKEN read… |
| 剪贴板 | NONE | NONE | — | Not accessed by any script or documentation |
| 浏览器 | READ | READ | ✓ 一致 | SKILL.md declares browser tool for account creation and OAuth; openclaw browser … |
| 数据库 | NONE | NONE | — | Not accessed; canary state stored in local JSON files only |
1 高危 7 项发现
高危 IP 地址 硬编码 IP 地址
1.2.3.4 references/api-reference.md:108 中危 外部 URL 外部 URL
https://community.tracebit.com SKILL.md:5 中危 外部 URL 外部 URL
https://community.tracebit.com/cli-login SKILL.md:123 中危 外部 URL 外部 URL
https://community.tracebit.com/api/v1/credentials/issue-credentials references/api-reference.md:94 中危 外部 URL 外部 URL
https://community.tracebit.com/api/v1/credentials/confirm-credentials references/api-reference.md:138 中危 外部 URL 外部 URL
https://attacker.com/payload references/attack-patterns.md:17 提示 邮箱 邮箱地址
[email protected] SKILL.md:162 目录结构
12 文件 · 94.4 KB · 2279 行 Markdown 7f · 1591L
Shell 4f · 651L
JSON 1f · 37L
├─
▾
assets
│ └─
canary-config.json
JSON
├─
▾
references
│ ├─
api-reference.md
Markdown
│ ├─
attack-patterns.md
Markdown
│ ├─
canary-types.md
Markdown
│ ├─
incident-response-playbook.md
Markdown
│ ├─
security-compliance.md
Markdown
│ └─
troubleshooting.md
Markdown
├─
▾
scripts
│ ├─
check-canaries.sh
Shell
│ ├─
install-tracebit.sh
Shell
│ ├─
parse-tracebit-alert.sh
Shell
│ └─
test-canary.sh
Shell
└─
SKILL.md
Markdown
依赖分析 4 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
curl | system | system binary | 否 | Used for GitHub API and binary downloads |
python3 | system | system binary | 否 | Used for JSON parsing and password generation |
jq | system | system binary | 否 | Required by parse-tracebit-alert.sh |
tracebit-cli | latest (from GitHub releases) | github.com/tracebit-com/tracebit-community-cli | 否 | SHA256-verified on install; open-source |
安全亮点
✓ Comprehensive human-gating: all deployment, remediation, and memory reads require human confirmation
✓ Mandatory SHA256 checksum verification for all binary downloads — cannot be bypassed
✓ All network connections are explicitly declared (community.tracebit.com, GitHub releases)
✓ All filesystem writes are declared and scoped (temp password, incident log, heartbeat check)
✓ No credential exfiltration — canary credentials are decoys; real credentials are never touched
✓ Open-source CLI (github.com/tracebit-com/tracebit-community-cli) with full source auditable
✓ Background daemon documented: only refreshes canary tokens, no data exfiltration
✓ Email access is strictly read-only — searches only for Tracebit alert emails
✓ Messaging is restricted to the user's own configured channel only
✓ Credential placement delegated to CLI only after explicit human approval
✓ No base64, eval, obfuscation, or dynamic code loading
✓ No iteration through environment variables for credential harvesting
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env) by the skill itself
✓ Removal script provided with full cleanup of all components