扫描报告
65 /100
stremio-cli
Stremio automation via browser + Torrentio on Mac Mini
SKILL.md explicitly claims the main script is 'legacy and not used', but it is fully functional code that performs undeclared shell execution via subprocess.Popen.
不要安装此技能
Do not use this skill. The documentation contains a direct lie about the script being unused while the code executes shell commands. Requires complete rewrite of SKILL.md to accurately reflect actual capabilities.
攻击链 4 步
◎
入口 Skill presented as safe browser automation tool in SKILL.md
SKILL.md:1⬡
提权 False statement claims script is 'not used' to hide true capabilities
SKILL.md:15⬡
提权 Full-featured Python script with browser + shell execution is actually deployed
scripts/stremio_cast.py:1⬡
提权 subprocess.Popen executes 'catt cast' shell command with captured stream URL
scripts/stremio_cast.py:67安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Explicit false statement about script status 文档欺骗 | SKILL.md:15 |
| 高危 | Undeclared shell command execution via subprocess 代码执行 | scripts/stremio_cast.py:67 |
| 中危 | Suspicious hardcoded streaming server URL 敏感访问 | scripts/stremio_cast.py:10 |
| 低危 | Potential injection via unsanitized stream URL 代码执行 | scripts/stremio_cast.py:67 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | NONE | — | No file operations in script |
| 网络访问 | NONE | READ | ✓ 一致 | scripts/stremio_cast.py:10 - Makes HTTP requests to external Stremio service |
| 命令执行 | NONE | WRITE | ✗ 越权 | scripts/stremio_cast.py:67 - subprocess.Popen(['catt', '-d', device, 'cast', str… |
| 浏览器 | READ | READ | ✓ 一致 | Playwright browser automation is declared and used |
2 项发现
中危 外部 URL 外部 URL
https://app.strem.io/shell-v4.4/?streamingServer=https%3A%2F%2F192-168-15-162.519b6502d940.stremio.rocks%3A12470#/ scripts/stremio_cast.py:10 提示 邮箱 邮箱地址
[email protected] SKILL.md:12 目录结构
3 文件 · 5.3 KB · 135 行 Python 1f · 88L
Markdown 1f · 42L
JSON 1f · 5L
├─
▾
scripts
│ └─
stremio_cast.py
Python
├─
_meta.json
JSON
└─
SKILL.md
Markdown
安全亮点
✓ Browser automation via Playwright is properly declared in SKILL.md
✓ No credential harvesting or exfiltration logic observed
✓ Script appears to be legitimate Stremio automation functionality