高风险 — 风险评分 65/100
上次扫描:1 天前 重新扫描
65 /100
stremio-cli
Stremio automation via browser + Torrentio on Mac Mini
SKILL.md explicitly claims the main script is 'legacy and not used', but it is fully functional code that performs undeclared shell execution via subprocess.Popen.
技能名称stremio-cli
分析耗时34.2s
引擎pi
不要安装此技能
Do not use this skill. The documentation contains a direct lie about the script being unused while the code executes shell commands. Requires complete rewrite of SKILL.md to accurately reflect actual capabilities.

攻击链 4 步

入口 Skill presented as safe browser automation tool in SKILL.md
SKILL.md:1
提权 False statement claims script is 'not used' to hide true capabilities
SKILL.md:15
提权 Full-featured Python script with browser + shell execution is actually deployed
scripts/stremio_cast.py:1
提权 subprocess.Popen executes 'catt cast' shell command with captured stream URL
scripts/stremio_cast.py:67

安全发现 4 项

严重性 安全发现 位置
高危
Explicit false statement about script status 文档欺骗
SKILL.md line 15 states 'The script in scripts/stremio_cast.py is Portuguese/legacy and not used — we rely on the built-in browser tool instead.' This is demonstrably false. The script is fully functional Python code with complete automation logic including browser control, stream URL interception, and shell command execution.
The script in `scripts/stremio_cast.py` is Portuguese/legacy and not used — we rely on the built-in browser tool instead.
→ Remove this false statement. Either use the script and declare its capabilities, or remove it entirely.
SKILL.md:15
高危
Undeclared shell command execution via subprocess 代码执行
The script executes 'catt cast' command via subprocess.Popen without any declaration in SKILL.md. This constitutes shell:WRITE capability that was never disclosed to the user.
subprocess.Popen(['catt', '-d', device, 'cast', stream_url])
→ Declare shell:WRITE capability if this execution is intentional and necessary.
scripts/stremio_cast.py:67
中危
Suspicious hardcoded streaming server URL 敏感访问
The URL contains a local network IP address (192.168.15.162) disguised as a subdomain of stremio.rocks. This could indicate a man-in-the-middle setup or a custom streaming server.
stremio_url = "https://app.strem.io/shell-v4.4/?streamingServer=https%3A%2F%2F192-168-15-162.519b6502d940.stremio.rocks%3A12470#/"
→ Verify this is a legitimate Stremio streaming server. If it's a custom server, this should be disclosed.
scripts/stremio_cast.py:10
低危
Potential injection via unsanitized stream URL 代码执行
The stream_url variable is captured from network request interception and passed directly to a shell command. If the URL contains special characters, this could be exploited.
subprocess.Popen(['catt', '-d', device, 'cast', stream_url])
→ Validate and sanitize stream_url before passing to shell command.
scripts/stremio_cast.py:67
资源类型声明权限推断权限状态证据
文件系统 NONE NONE No file operations in script
网络访问 NONE READ ✓ 一致 scripts/stremio_cast.py:10 - Makes HTTP requests to external Stremio service
命令执行 NONE WRITE ✗ 越权 scripts/stremio_cast.py:67 - subprocess.Popen(['catt', '-d', device, 'cast', str…
浏览器 READ READ ✓ 一致 Playwright browser automation is declared and used
2 项发现
🔗
中危 外部 URL 外部 URL
https://app.strem.io/shell-v4.4/?streamingServer=https%3A%2F%2F192-168-15-162.519b6502d940.stremio.rocks%3A12470#/
scripts/stremio_cast.py:10
📧
提示 邮箱 邮箱地址
[email protected]
SKILL.md:12

目录结构

3 文件 · 5.3 KB · 135 行
Python 1f · 88L Markdown 1f · 42L JSON 1f · 5L
├─ 📁 scripts
│ └─ 🐍 stremio_cast.py Python 88L · 3.6 KB
├─ 📋 _meta.json JSON 5L · 130 B
└─ 📝 SKILL.md Markdown 42L · 1.5 KB

安全亮点

✓ Browser automation via Playwright is properly declared in SKILL.md
✓ No credential harvesting or exfiltration logic observed
✓ Script appears to be legitimate Stremio automation functionality